Invoker - Penetration Testing Utility
Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some features require administrative privileges.Capabilities:invoke the...
View ArticleParsec - Secure Cloud Framework
Homepage: https://parsec.cloudDocumentation: https://parsec-cloud.readthedocs.org.Parsec is a free software (AGPL v3) aiming at easily share your work and data in the cloud in total privacy thanks to...
View ArticleGenerator-Burp-Extension - Everything You Need About Burp Extension Generation
Everything You Need About Burp Extension GenerationInstallationFirst, install Yeoman and generator-burp-extension using npm (we assume you have pre-installed node.js).npm install -g yonpm install -g...
View ArticleSshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool...
A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan module.Usage[ hacker@blackarch ~ ]$ sshprank -H--==[ sshprank by nullsecurity.net ]==--usage sshprank...
View ArticleTorghostNG - Make All Your Internet Traffic Anonymized Through Tor Network
TorghostNG is a tool that make all your internet traffic anonymized through Tor network.Rewritten from TorGhost with Python 3.TorghostNG was tested on:Kali LinuxManjaro...Before you use TorghostNGFor...
View ArticleNexphisher - Advanced Phishing Tool For Linux & Termux
NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30...
View ArticleHiveJack - This Tool Can Be Used During Internal Penetration Testing To Dump...
This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM registry hives and once copied to...
View ArticlePowerSploit - A PowerShell Post-Exploitation Framework
PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and...
View ArticleHow to Set Up a VPN on Kodi in 2 Minutes or Less
VPNs are useful for masking your identity when online. Without a VPN, you run the risk of having your data exposed to your Internet Service Provider (ISP). This is something that you should think about...
View ArticlePowerob - An On-The-Fly Powershell Script Obfuscator Meant For Red Team...
An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.Installationgit clone https://github.com/cwolff411/powerobUsagepython3 powerob.py obfuscate...
View ArticleShellerator - Simple CLI Tool For The Generation Of Bind And Reverse Shells...
Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java, Python...). This project is inspired by...
View ArticleGDBFrontend - An Easy, Flexible And Extensionable GUI Debugger
GDBFrontend is an easy, flexible and extensionable gui debugger.InstallingDeb Package (Debian / Ubuntu / KDE Neon)You can install GDBFrontend via deb package for Debian-based distributions.You can...
View ArticleExegol - Exegol Is A Kali Light Base With A Few Useful Additional Tools And...
Exegol is a fully configured kali light base with a few useful additional tools (~50), a few useful resources (scripts and binaries for privesc, credential theft etc.) and some configuration...
View ArticlePayloadsAllTheThings - A List Of Useful Payloads And Bypass For Web...
A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !Every section contains the following files, you can use the _template_vuln...
View ArticleCatchyou - FUD Win32 Msfvenom Payload Generator
Fully Undetectable Win32 MSFVenom Payload Generator (meterpreter/shell reverse tcp)Author: github.com/thelinuxchoice/catchyouTwitter: twitter.com/linux_choicePlease, don't upload to VirusTotal! Use...
View ArticleWifipumpkin3 - Powerful Framework For Rogue Access Point Attack
wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to...
View ArticleThreadtear - Multifunctional Java Deobfuscation Tool Suite
Threadtear is a multifunctional deobfuscation tool for java. Suitable for easier code analysis without worrying too much about obfuscation. Even the most expensive obfuscators like ZKM or Stringer are...
View ArticleClipboardme - Grab And Inject Clipboard Content By Link
Grab/Inject Clipboard ContentBrowsers are implementing a new JavaScript API for asynchronous clipboard access to integrate copy and paste into web applications. It is a replacement for the synchronous...
View ArticleKali Linux 2020.2 Release - Penetration Testing and Ethical Hacking Linux...
We are incredibly excited to announce the second release of 2020, Kali Linux 2020.1.2A quick overview of what’s new since January:KDE Plasma Makeover & LoginPowerShell by Default. Kind of.Kali on...
View ArticleKaiten - A Undetectable Payload Generation
A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not...
View Article