Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Donut - Generates X86, X64, Or AMD64+x86 Position-Independent Shellcode That...

Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into an arbitrary Windows processes for in-memory execution....

View Article


Image may be NSFW.
Clik here to view.

Sojobo - A Binary Analysis Framework

Sojobo is an emulator for the B2R2 framework. It was created to easier the analysis of potentially malicious files. It is totally developed in .NET so you don't need to install or compile any other...

View Article


Image may be NSFW.
Clik here to view.

Vscan - Vulnerability Scanner Tool Using Nmap And Nse Scripts

vulnerability scanner tool is using nmap and nse scripts to find vulnerabilitiesThis tool puts an additional value into vulnerability scanning with nmap. It uses NSE scripts which can add flexibility...

View Article

Image may be NSFW.
Clik here to view.

DFIRtriage - Digital Forensic Acquisition Tool For Windows Based Incident...

DFIRtriage is a tool intended to provide Incident Responders with rapid host data. Written in Python, the code has been compiled to eliminate the dependency of python on the target host. The tool will...

View Article

Image may be NSFW.
Clik here to view.

Sgx-Step - A Practical Attack Framework For Precise Enclave Execution Control

SGX-Step is an open-source framework to facilitate side-channel attack research on Intel SGX platforms. SGX-Step consists of an adversarial Linux kernel driver and user space library that allow to...

View Article


Image may be NSFW.
Clik here to view.

Adaudit - Powershell Script To Do Domain Auditing Automation

PowerShell Script to perform a quick AD audit_____ ____ _____ _ _ _| _ | \ | _ |_ _ _| |_| |_| | | | | | | | . | | _||__|__|____/ |__|__|___|___|_|_| by phillips321If you have any decent powershell one...

View Article

Image may be NSFW.
Clik here to view.

threat_note - DPS' Lightweight Investigation Notebook

threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve indicators related to their research. As of right now this includes the...

View Article

Image may be NSFW.
Clik here to view.

GCPBucketBrute - A Script To Enumerate Google Storage Buckets, Determine What...

A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.This script (optionally) accepts GCP user/service account...

View Article


Image may be NSFW.
Clik here to view.

HAL - The Hardware Analyzer

HAL [/hel/] is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged plugin...

View Article


Image may be NSFW.
Clik here to view.

Cacti - Complete Network Graphing Solution

IMPORTANTWhen using source or by downloading the code directly from the repository, it is important to run the database upgrade script if you experience any errors referring to missing tables or...

View Article

Image may be NSFW.
Clik here to view.

Rsdl - Subdomain Scan With Ping Method

Subdomain Scan With Ping Method.FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the output with the domain name.--list/tmp/lists/example.txtLister for...

View Article

Image may be NSFW.
Clik here to view.

NetAss2 - Network Assessment Assistance Framework

Easier network scanning with NetAss2 (Network Assessment Assistance Framework).Make it easy for Pentester to do penetration testing on network.Dependenciesnmap (tool)zmap (tool)Installationgit clone...

View Article

Image may be NSFW.
Clik here to view.

Asset Discover - Burp Suite Extension To Discover Assets From HTTP Response

Burp Suite extension to discover assets from HTTP response using passive scanning. Refer our blog Asset Discovery using Burp Suite for more details.The extension is now part of the BApp store and can...

View Article


Image may be NSFW.
Clik here to view.

Brave Browser - Next Generation Secure, Fast And Private Web Browser with...

The Brave Privacy Browser is your fast, safe private web browser with ad blocker, private tabs and pop-up blocker. Browse without being tracked by advertisers, malware and pop-ups. Fast & Secure...

View Article

Image may be NSFW.
Clik here to view.

Rainbow Crackalack - Rainbow Table Generation And Lookup Tools

This project produces open-source code to generate rainbow tables as well as use them to look up password hashes. While the current release only supports NTLM, future releases aim to support MD5,...

View Article


Image may be NSFW.
Clik here to view.

Evil-Winrm v1.9 - The Ultimate WinRM Shell For Hacking/Pentesting

This shell is the ultimate WinRM shell for hacking/pentesting.WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol. A standard SOAP based protocol that allows...

View Article

Image may be NSFW.
Clik here to view.

RFI/LFI Payload List

As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a second person to have it. Now this article will hopefully give you an idea of...

View Article


Image may be NSFW.
Clik here to view.

Jaeles - The Swiss Army Knife For Automated Web Application Testing

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.Installationgo get -u github.com/jaeles-project/jaelesPlease visit the...

View Article

Image may be NSFW.
Clik here to view.

Vulnx v1.9 - An Intelligent Bot Auto Shell Injector That Detect...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of Cms, fast cms detection,informations gathering and vulnerabilitie Scanning of the target like...

View Article

Image may be NSFW.
Clik here to view.

Seeker v1.1.9 - Accurately Locate Smartphones Using Social Engineering

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.Seeker Hosts a fake...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>