Vthunting - A Tiny Script Used To Generate Report About VirusTotal Hunting...
Virus Total Hunting is a tiny tool based on the VT api version 3 to run daily, weekly or monthly report about malware hunting. The report can be send via email, Slack channel or Telegram. The tool can...
View ArticlePython-Iocextract - Advanced Indicator Of Compromise (IOC) Extractor
Advanced Indicator of Compromise (IOC) extractor.OverviewThis library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules from text corpora. It includes some encoded and...
View ArticlePcapXray v2.5 - A Network Forensics Tool To Visualize A Packet Capture...
PcapXray is a Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction.PcapXray Design...
View ArticleANDRAX v3 - The First And Unique Penetration Testing Platform For Android...
ANDRAX The first and unique Penetration Testing platform for Android smartphones.Thanks to Jessica Helena she made ANDRAX v3 possible.What is ANDRAXANDRAX is a penetration testing platform developed...
View ArticleVulners Scanner for Android - Passive Vulnerability Scanning Based On...
Vulners Scanner is developed by Vulners Team, the founders and maintainers of one of the world largest security databases.It implements technology of passive vulnerability scanning based on software...
View ArticleripVT - Virus Total API Maltego Transform Set For Canari
Maltego Canari transforms for Virus Total private API. Provided AS-IS, no warranties, no guarantees.No jokes in this repo. It's as serious as you are.InstallationRequires Canari, specifically this...
View ArticleReverseTCPShell - PowerShell ReverseTCP Shell, Client & Server
Reverse Encrypted (AES 256-bit) Shell over TCP - using PowerShell SecureString.Attacker (C2-Server Listener):PS> .\ReverseTCP.ps1Target (Client):CMD> ECHO...
View ArticleGhostDelivery - This Tool Creates A Obfuscated .vbs Script To Download A...
Python script to generate obfuscated .vbs script that delivers payload with persistence and windowsantivirus disabling functions.Features:Downloads payload to TEMP directory and executes payload to...
View ArticleH8Mail v2.0 - Email OSINT And Password Breach Hunting
Powerful and user-friendly password finder.Use h8mail to find passwords through different breach and reconnaissance services, or using local breaches such as Troy Hunt's "Collection1" or the infamous...
View ArticlePhoneSploit v1.2 - Using Open Adb Ports We Can Exploit A Andriod Device
Using open Adb ports we can exploit an Andriod device.you can find open ports here https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge”To find out how to access a...
View ArticleZydra - File Password Recovery Tool And Linux Shadow File Cracker
Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for cracking passwords.Supported FilesRAR FilesLegacy ZIP FilesPDF FilesLinux...
View ArticleRecsech - Tool For Doing Footprinting And Reconnaissance On The Target Web
Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance...
View ArticleLiveHiddenCamera - Library Which Record Live Video And Audio From Android...
Live Hidden Camera (LHC) is a library which record live video and audio from Android device without displaying a preview.How to useI've created a library to make it more usable. The only requirement is...
View ArticleShellphish - Phishing Tool For 18 Social Media (Instagram, Facebook,...
Phishing Tool for 18 social media: Instagram, Facebook, Snapchat, Github, Twitter, Yahoo, Protonmail, Spotify, Netflix, Linkedin, Wordpress, Origin, Steam, Microsoft, InstaFollowers, Gitlab,...
View ArticleTOR Router - A Tool That Allow You To Make TOR Your Default Gateway And Send...
Tor Router allow you to use TOR as a transparent proxy and send all your trafic under TOR INCLUDING DNS REQUESTS, the only that you need is: a system using systemd (if you want to use the service) and...
View ArticleUserrecon - Find Usernames Across Over 75 Social Networks
Find usernames across over 75 social networks This is useful if you are running an investigation to determine the usage of the same username on different social networks.Author: @linux_choiceDownload...
View ArticleWhatWeb v0.5.0 - Next Generation Web Scanner
Developed by Andrew Horton urbanadventurer and Brendan Coles bcolesLatest Release: v0.5.0. June 9th, 2019License: GPLv2This product is subject to the terms detailed in the license agreement. For more...
View ArticleFaraday v3.8 - Collaborative Penetration Test and Vulnerability Management...
Here are the main new features and improvements in Faraday v3.8:Set up Faraday with a double click!We are committed to facilitate your work processes. With that in mind, we enhanced our installation...
View ArticleRecScanSec - Reconnaisance Scanner Security
RecScanSec made for reconnaisance Scanner and information gathering with an emphasis on simplicity.It will do everything from.FeaturesInformation Security HeadersWAF AnalyzerInformation...
View ArticleRapidScan - The Multi-Tool Web Vulnerability Scanner
Evolution:It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a...
View Article