Sherlock - Find Usernames Across Social Networks
Find usernames across social networksInstallationNOTE: Python 3.6 or higher is required.# clone the repo$ git clone https://github.com/sherlock-project/sherlock.git# change the working directory to...
View ArticleSQLMap v1.3.7 - Automatic SQL Injection And Database Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection...
View ArticleIcebox - Virtual Machine Introspection, Tracing & Debugging
Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based on project Winbagility.Files which might be helpful:INSTALL.md:...
View ArticleMIG - Distributed And Real Time Digital Forensics At The Speed Of The Cloud
MIG is Mozilla's platform for investigative surgery of remote endpoints.Quick Start w/ DockerYou can spin up a local-only MIG setup using docker. The container is not suitable for production use but...
View ArticleHash-Identifier - Software To Identify The Different Types Of Hashes Used To...
Software to identify the different types of hashes used to encrypt data and especially passwords.Encryption formats...
View ArticleSlackor - A Golang Implant That Uses Slack As A Command And Control Server
A Golang implant that uses Slack as a command and control channel.This project was inspired by Gcat and Twittor.This tool is released as a proof of concept. Be sure to read and understand the Slack App...
View ArticleFbchecker - Facebook Mass Account Checker
Facebook Mass Account CheckerSimple Installation :apt install gitapt install phpgit clone https://github.com/fdciabdul/fbcheckercd fbcheckerphp fbcheck.phpUsage php fbcheck.php target.txtDownload...
View ArticleWesng - Windows Exploit Suggester
WES-NG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is vulnerable to, including any exploits for these vulnerabilities. Every Windows...
View ArticleRock-ON - An All In One Recon Tool That Will Just Get A Single Entry Of The...
Rock-On is a all in one recon tool that will help your Recon process give a boost. It is mainley aimed to automate the whole process of recon and save the time that is being wasted in doing all this...
View ArticleYouzer - Fake User Generator For Active Directory Environments
Fake User Generator for Active Directory EnvironmentsIntroductionThe goal of Youzer is to create information rich Active Directory environments. This uses the python3 library 'faker' to generate random...
View ArticleDarkScrape - OSINT Tool For Scraping Dark Websites
OSINT Tool to find Media Links in Tor Sites.Tested OnKali Linux 2019.2Ubuntu 18.04NethunterArc LinuxInstallationgit clone https://github.com/itsmehacker/DarkScrape.gitpip3 install -r...
View ArticleNetSet - Operational Security Utility And Automator
Operational Security utility and automator.NetSet is designed to automate a number of operations that will help the user with securing their network traffic. It also provides an easy way to gather...
View ArticleSneakyEXE - Embedding "UAC-Bypassing" Function Into Your Custom Payload
A tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )Tested on Windows 7,8,10 ( 64bit)Free and Open-sourced with full source codes...
View ArticleWhonix v15 - Anonymous Operating System
Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation. DNS leaks are impossible, and not even...
View ArticleLinux-Smart-Enumeration - Linux Enumeration Tool For Pentesting And CTFs With...
First, a couple of useful oneliners ;)wget "https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh" -O lse.shcurl...
View ArticleRifiuti2 - Windows Recycle Bin Analyser
Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer forensics. Rifiuti2 can extract file deletion time, original...
View ArticleRegipy - An OS Independent Python Library For Parsing Offline Registry Hives
Regipy is a python library for parsing offline registry hives. regipy has a lot of capabilities:Use as a library: Recurse over the registry hive, from root or a given path and get all subkeys and...
View ArticleWinObjEx64 - Windows Object Explorer 64-Bit
WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on it or use the "Properties..." toolbar button to get more...
View ArticleCloud Security Audit - A Command Line Security Audit Tool For Amazon Web...
A command line security audit tool for Amazon Web ServicesAboutCloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be able to identify...
View ArticleEchidna - Ethereum Fuzz Testing Framework
Echidna is a weird creature that eats bugs and is highly electrosensitive (with apologies to Jacob Stanley)More seriously, Echidna is a Haskell library designed for fuzzing/property-based testing of...
View Article