Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Hvazard - Remove Short Passwords & Duplicates, Change Lowercase To Uppercase...

Remove short passwords& duplicates, change lowercase to uppercase & reverse, combine wordlists!Manual & explaination-d --dict Specifies the file you want to modify. This is the only...

View Article


Image may be NSFW.
Clik here to view.

SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules Misconfigurations And...

If you like the project and for my personal motivation so as to develop other tools please a +1 star *SUDO_KILLERSUDO_KILLER is a tool which help to abuse SUDO in different ways and with the main...

View Article


Image may be NSFW.
Clik here to view.

HiddenEye - Modern Phishing Tool With Advanced Functionality...

Modern Phishing Tool With Advanced Functionality PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERINGDEVELOPERS & CONTRIBUTORSANONUD4Y...

View Article

Image may be NSFW.
Clik here to view.

Dockernymous - A Script Used To Create A Whonix Like Gateway/Workstation...

Dockernymous is a start script for Docker that runs and configures two individual Linux containers in order act as a anonymisation workstation-gateway set up.It's aimed towards experienced Linux/Docker...

View Article

Image may be NSFW.
Clik here to view.

VulnWhisperer - Create Actionable Data From Your Vulnerability Scans

Create actionable data from your vulnerability scans VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability...

View Article


Image may be NSFW.
Clik here to view.

AMIRA - Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters, in particular The One Filter to Rule...

View Article

Image may be NSFW.
Clik here to view.

Airopy - Get Clients And Access Points

Get clients and access points. With Alfa cards this script works correctly.DependenciesTo run this script first install requirements as follows:sudo pip3 install requirements.txt How to useIn the...

View Article

Image may be NSFW.
Clik here to view.

Evil-Winrm - The Ultimate WinRM Shell For Hacking/Pentesting

The ultimate WinRM shell for hacking/pentesting. ___ __ __ ____ _ / _] | || || | / [_| | | | | | | | _] | | | | | |___ | [_| : | | | | | | |\ / | | | | |_____| \_/ |____||_____| __ __ ____ ____ ____...

View Article


Image may be NSFW.
Clik here to view.

Pyattck - A Python Module To Interact With The Mitre ATT&CK Framework

A Python Module to interact with the Mitre ATT&CK Framework.pyattck has the following notable features in it's current release: Retrieve all Tactics, Techniques, Actors, Malware, Tools, and...

View Article


Image may be NSFW.
Clik here to view.

O365-Attack-Toolkit - A Toolkit To Attack Office365

o365-attack-toolkit allows operators to perform an OAuth phishing attack and later on use the Microsoft Graph API to extract interesting information.Some of the implemented features are :Extraction of...

View Article

Image may be NSFW.
Clik here to view.

grapheneX - Automated System Hardening Framework

grapheneXIn computing, hardening is usually the process of securing a system by reducing its surface of vulnerability, which is larger when a system performs more functions; in principle a...

View Article

Image may be NSFW.
Clik here to view.

Cloudcheck - Checks Using A Test String If A Cloudflare DNS Bypass Is...

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same folder before using.Also create a empty text file called none.txt in the data folder,...

View Article

Image may be NSFW.
Clik here to view.

Orbit v2.0 - Blockchain Transactions Investigation Tool

IntroductionOrbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a graph to reveal major sources, sinks and...

View Article


Image may be NSFW.
Clik here to view.

Vulnado - Purposely Vulnerable Java Application To Help Lead Secure Coding...

This application and exercises will take you through some of the OWASP top 10 Vulnerabilities and how to prevent them.Up and runningInstall Docker for MacOS or Windows. You'll need to create a Docker...

View Article

Image may be NSFW.
Clik here to view.

OSXCollector - A Forensic Evidence Collection & Analysis Toolkit For OS X

OSXCollector is a forensic evidence collection & analysis toolkit for OSX.Forensic CollectionThe collection script runs on a potentially infected machine and outputs a JSON file that describes the...

View Article


Image may be NSFW.
Clik here to view.

Uncompyle6 - A Cross-Version Python Bytecode Decompiler

A native Python cross-version decompiler and fragment decompiler. The successor to decompyle, uncompyle, and uncompyle2.Introductionuncompyle6 translates Python bytecode back into equivalent Python...

View Article

Image may be NSFW.
Clik here to view.

Recon-ng v5.0.0 - Open Source Intelligence Gathering Tool Aimed At Reducing...

Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open-source web-based reconnaissance quickly and thoroughly.Recon-ng has a...

View Article


Image may be NSFW.
Clik here to view.

RedGhost v3.0 - Linux Post Exploitation Framework Written In Bash Designed To...

Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.PayloadsFunction to generate various encoded reverse shells in...

View Article

Image may be NSFW.
Clik here to view.

WeebDNS - DNS Enumeration With Asynchronicity

DNS Enumeration Tool with Asynchronicity.FeaturesWeebDNS is an 'Asynchronous' DNS Enumeration Tool made with Python3 which makes it much faster than normal Tools.PREREQUISITESPython 3.xpip3gitPYTHON 3...

View Article

Image may be NSFW.
Clik here to view.

WDExtract - Extract Windows Defender Database From Vdm Files And Unpack It

Extract Windows Defender database from vdm files and unpack itThis program distributed as-is, without any warranty;No official support, if you like this tool, feel free to contribute.FeaturesUnpack VDM...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>