Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

RetDec - A Retargetable Machine-Code Decompiler Based On LLVM

RetDec is a retargetable machine-code decompiler based on LLVM.The decompiler is not limited to any particular target architecture, operating system, or executable file format:Supported file formats:...

View Article


Image may be NSFW.
Clik here to view.

AntiDisposmail - Detecting Disposable Email Addresses

Antbot.pw provides a free, open API endpoint for checking a domain or email address against a frequently-updated list of disposable domains. CORS is enabled for all originating domains, so you can call...

View Article


Image may be NSFW.
Clik here to view.

Open Redirect Payload List

Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By...

View Article

Image may be NSFW.
Clik here to view.

Apk-Mitm - A CLI Application That Prepares Android APK Files For HTTPS...

A CLI application that automatically prepares Android APK files for HTTPS inspectionInspecting a mobile app's HTTPS traffic using a proxy is probably the easiest way to figure out how it works....

View Article

Image may be NSFW.
Clik here to view.

Functrace - A Function Tracer

functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based on DynamoRIO):disassemble all the...

View Article


Image may be NSFW.
Clik here to view.

Ngrev - Tool For Reverse Engineering Of Angular Applications

Graphical tool for reverse engineering of Angular projects. It allows you to navigate in the structure of your application and observe the relationship between the different modules, providers, and...

View Article

Image may be NSFW.
Clik here to view.

CAINE 11 - GNU/Linux Live Distribution For Digital Forensics Project, Windows...

CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a Digital Forensics project. Currently, the project manager is Nanni Bassetti (Bari - Italy).CAINE...

View Article

Image may be NSFW.
Clik here to view.

ReconPi - Set Up Your Raspberry Pi To Perform Basic Recon Scans

ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.Start using that Raspberry Pi -- I know you all have one laying around somewhere...

View Article


Image may be NSFW.
Clik here to view.

Genact - A Nonsense Activity Generator

Pretend to be busy or waiting for your computer when you should actually be doing real work! Impress people with your insane multitasking skills. Just open a few instances of genact and watch the show....

View Article


Image may be NSFW.
Clik here to view.

Fileintel - A Modular Python Application To Pull Intelligence About Malicious...

This is a tool used to collect various intelligence sources for a given file. Fileintel is written in a modular fashion so new intelligence sources can be easily added.Files are identified by file hash...

View Article

Image may be NSFW.
Clik here to view.

Ffuf - Fast Web Fuzzer Written In Go

A fast web fuzzer written in Go.Heavily inspired by the great projects gobuster and wfuzz.FeaturesFast!Allows fuzzing of HTTP header values, POST data, and different parts of URL, including GET...

View Article

Image may be NSFW.
Clik here to view.

Splunk Attack Range - A Tool That Allows You To Create Vulnerable...

The Attack Range solves two main challenges in development of detections. First, it allows the user to quickly build a small lab infrastructure as close as possible to your production environment. This...

View Article

Image may be NSFW.
Clik here to view.

HashCobra - Hash Cracking Tool

hashcobra Hash Cracking tool.Usage$ ./hashcobra -H--==[ hashcobra by sepehrdad ]==--usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> - hashing algorithm [default: md5] - ? to...

View Article


Image may be NSFW.
Clik here to view.

RTTM - Real Time Threat Monitoring Tool

Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the company goes unnoticed until it becomes viral in public. Thus causing...

View Article

Image may be NSFW.
Clik here to view.

Exploitivator - Automate Metasploit Scanning And Exploitation

This has only been tested on Kali.It depends on the msfrpc module for Python, described in detail here: https://www.trustwave.com/Resources/SpiderLabs-Blog/Scripting-Metasploit-using-MSGRPC/Install the...

View Article


Image may be NSFW.
Clik here to view.

Dsiem - Security Event Correlation Engine For ELK Stack

Dsiem is a security event correlation engine for ELK stack, allowing the platform to be used as a dedicated and full-featured SIEM system.Dsiem provides OSSIM-style correlation for normalized...

View Article

Image may be NSFW.
Clik here to view.

CyberRange - The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world.This project provides a bootstrap framework for a complete offensive, defensive, reverse engineering, &...

View Article


Image may be NSFW.
Clik here to view.

Haaukins - A Highly Accessible And Automated Virtualization Platform For...

Haaukins is a highly accessible and automated virtualization platform for security education, it has three main components (Docker, Virtualbox and Golang), the communication and orchestration between...

View Article

Image may be NSFW.
Clik here to view.

EXIST - Web Application For Aggregating And Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence).EXIST is written by the following software.Python 3.5.4Django 1.11.22ConceptEXIST is a web application for...

View Article

Image may be NSFW.
Clik here to view.

Nginx Log Check - Nginx Log Security Analysis Script

Nginx Log Security Analysis ScriptFeaturesStatistics Top 20 AddressSQL injection analysisScanner alert analysisExploit detectionSensitive path accessFile contains attackWebshellFind URLs with response...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>