Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Yaazhini - Free Android APK & API Vulnerability Scanner

Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. Yaazhini...

View Article


Image may be NSFW.
Clik here to view.

Intensio-Obfuscator - Obfuscate A Python Code 2.X And 3.X

Takes a python source code and transform it into an obfuscated python code, replace name of variables - classes - functions to random chars and defined length, removes comments, line breaks and add to...

View Article


Image may be NSFW.
Clik here to view.

PhoneInfoga - Advanced Information Gathering & OSINT Tool For Phone Numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any...

View Article

Image may be NSFW.
Clik here to view.

Salsa Tools - ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP and AV bypass, AMSI...

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in any Windows environment without even needing PowerShell for it's execution. In order...

View Article

Image may be NSFW.
Clik here to view.

Rustbuster - DirBuster For Rust

DirBuster for Rust.UsageThere are three modules currently implemented: Dirbuster (default)rustbuster -m dir -u http://localhost:3000/ -w examples/wordlist -e php Dnsbusterrustbuster -m dns -u...

View Article


Image may be NSFW.
Clik here to view.

CocoaDebug - iOS Debugging Tool

 iOS Debugging ToolShake to hide or show the black bubble. (support both device and simulator)Long press the black bubble to show UIDebuggingInformationOverlay. (Apple's Private API, support iOS...

View Article

Image may be NSFW.
Clik here to view.

Getwin - FUD Win32 Payload Generator And Listener

FUD Win32payload generator and listenerLegal disclaimer:Usage of GetWin for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local,...

View Article

Image may be NSFW.
Clik here to view.

Seccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan and on repeated scans.On repeated scan delta...

View Article


Image may be NSFW.
Clik here to view.

Terminus - A Terminal For A More Modern Age

Terminus is a highly configurable terminal emulator for Windows, macOS and LinuxTheming and color schemesFully configurable shortcutsSplit panesRemembers your tabsPowerShell (and PS Core), WSL,...

View Article


Image may be NSFW.
Clik here to view.

Quarantyne - Modern Web Firewall: Stop Account Takeovers, Weak Passwords,...

Automated web security made simpleQuarantyne is a reverse-proxy that protects web applications and APIs from fraudulent behavior, misuse, bots and cyber-attacks in real-time.RequirementsJava...

View Article

Image may be NSFW.
Clik here to view.

Prithvi - Report Generation Tool

Prithvi is a report generation tool specially made for Security Assessment which is free to use and easy to use. It will generate high quality vulnerability assessment report for security controls. It...

View Article

Image may be NSFW.
Clik here to view.

Kippo - SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker.Kippo is inspired, but not based on...

View Article

Image may be NSFW.
Clik here to view.

Konan - Advanced Web Application Dir Scanner

Konan is an advanced open source tool designed to brute force directories and files names on web/application servers.InstallationDownload Konan by cloning the Git repository:git clone...

View Article


Image may be NSFW.
Clik here to view.

Seth - Perform A MitM Attack And Extract Clear Text Credentials From RDP...

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate...

View Article

Image may be NSFW.
Clik here to view.

Rdpscan - A Quick Scanner For The CVE-2019-0708 "BlueKeep" Vulnerability

This is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the public Internet vulnerable to this vulnerability,...

View Article


Image may be NSFW.
Clik here to view.

DNSlivery - Easy Files And Payloads Delivery Over DNS

Easy files and payloads delivery over DNS.AcknowledgmentsThis project has been originally inspired by PowerDNS and Joff Thyer's technical segment on the Paul's Security Weekly podcast #590...

View Article

Image may be NSFW.
Clik here to view.

GhostSquadHackers - Encrypt/Encode Your Javascript Code

Encrypt/Encode your Javascript payloads/code. (Windows Scripting)This tool is meant to encode and encrypt your javascript code.FeaturesNumber CalculatingASCII codesCaeser-EncryptionHex EncodingOctal...

View Article


Image may be NSFW.
Clik here to view.

BackBox Linux 6.0 - Ubuntu-based Linux Distribution Penetration Test and...

BackBox Linux is a penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit. It includes some of the most commonly known/used security...

View Article

Image may be NSFW.
Clik here to view.

URLextractor - Information Gathering and Website Reconnaissance

Information gathering& website reconnaissanceUsage:./extractor http://www.hackthissite.org/Tips:Colorex: put colors to the ouput pip install colorex and use it like ./extractor...

View Article

Image may be NSFW.
Clik here to view.

MozDef - Mozilla Enterprise Defense Platform

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others are readily available to help attackers coordinate,...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>