Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Invoker - Penetration Testing Utility

Penetration testing utility.The goal is to use this tool when access to some Windows OS features through GUI is restricted.Some features require administrative privileges.Capabilities:invoke the...

View Article


Image may be NSFW.
Clik here to view.

Parsec - Secure Cloud Framework

Homepage: https://parsec.cloudDocumentation: https://parsec-cloud.readthedocs.org.Parsec is a free software (AGPL v3) aiming at easily share your work and data in the cloud in total privacy thanks to...

View Article


Image may be NSFW.
Clik here to view.

Generator-Burp-Extension - Everything You Need About Burp Extension Generation

Everything You Need About Burp Extension GenerationInstallationFirst, install Yeoman and generator-burp-extension using npm (we assume you have pre-installed node.js).npm install -g yonpm install -g...

View Article

Image may be NSFW.
Clik here to view.

Sshprank - A Fast SSH Mass-Scanner, Login Cracker And Banner Grabber Tool...

A fast SSH mass-scanner, login cracker and banner grabber tool using the python-masscan module.Usage[ hacker@blackarch ~ ]$ sshprank -H--==[ sshprank by nullsecurity.net ]==--usage sshprank...

View Article

Image may be NSFW.
Clik here to view.

TorghostNG - Make All Your Internet Traffic Anonymized Through Tor Network

TorghostNG is a tool that make all your internet traffic anonymized through Tor network.Rewritten from TorGhost with Python 3.TorghostNG was tested on:Kali LinuxManjaro...Before you use TorghostNGFor...

View Article


Image may be NSFW.
Clik here to view.

Nexphisher - Advanced Phishing Tool For Linux & Termux

NexPhisher is an automated Phishing tool made for Termux & Linux .The phishing Pages are Taken from Zphisher under GNU General Public License v3.0 . This tool has 37 Phishing Page Templates of 30...

View Article

Image may be NSFW.
Clik here to view.

HiveJack - This Tool Can Be Used During Internal Penetration Testing To Dump...

This tool can be used during internal penetration testing to dump Windows credentials from an already-compromised host. It allows one to dump SYSTEM, SECURITY and SAM registry hives and once copied to...

View Article

Image may be NSFW.
Clik here to view.

PowerSploit - A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment. PowerSploit is comprised of the following modules and...

View Article


Image may be NSFW.
Clik here to view.

How to Set Up a VPN on Kodi in 2 Minutes or Less

VPNs are useful for masking your identity when online. Without a VPN, you run the risk of having your data exposed to your Internet Service Provider (ISP). This is something that you should think about...

View Article


Image may be NSFW.
Clik here to view.

Powerob - An On-The-Fly Powershell Script Obfuscator Meant For Red Team...

An on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity.Installationgit clone https://github.com/cwolff411/powerobUsagepython3 powerob.py obfuscate...

View Article

Image may be NSFW.
Clik here to view.

Shellerator - Simple CLI Tool For The Generation Of Bind And Reverse Shells...

Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java, Python...). This project is inspired by...

View Article

Image may be NSFW.
Clik here to view.

GDBFrontend - An Easy, Flexible And Extensionable GUI Debugger

GDBFrontend is an easy, flexible and extensionable gui debugger.InstallingDeb Package (Debian / Ubuntu / KDE Neon)You can install GDBFrontend via deb package for Debian-based distributions.You can...

View Article

Image may be NSFW.
Clik here to view.

Exegol - Exegol Is A Kali Light Base With A Few Useful Additional Tools And...

Exegol is a fully configured kali light base with a few useful additional tools (~50), a few useful resources (scripts and binaries for privesc, credential theft etc.) and some configuration...

View Article


Image may be NSFW.
Clik here to view.

PayloadsAllTheThings - A List Of Useful Payloads And Bypass For Web...

A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !Every section contains the following files, you can use the _template_vuln...

View Article

Image may be NSFW.
Clik here to view.

Catchyou - FUD Win32 Msfvenom Payload Generator

Fully Undetectable Win32 MSFVenom Payload Generator (meterpreter/shell reverse tcp)Author: github.com/thelinuxchoice/catchyouTwitter: twitter.com/linux_choicePlease, don't upload to VirusTotal! Use...

View Article


Image may be NSFW.
Clik here to view.

Wifipumpkin3 - Powerful Framework For Rogue Access Point Attack

wifipumpkin3 is powerful framework for rogue access point attack, written in Python, that allow and offer to security researchers, red teamers and reverse engineers to mount a wireless network to...

View Article

Image may be NSFW.
Clik here to view.

Threadtear - Multifunctional Java Deobfuscation Tool Suite

Threadtear is a multifunctional deobfuscation tool for java. Suitable for easier code analysis without worrying too much about obfuscation. Even the most expensive obfuscators like ZKM or Stringer are...

View Article


Image may be NSFW.
Clik here to view.

Clipboardme - Grab And Inject Clipboard Content By Link

Grab/Inject Clipboard ContentBrowsers are implementing a new JavaScript API for asynchronous clipboard access to integrate copy and paste into web applications. It is a replacement for the synchronous...

View Article

Image may be NSFW.
Clik here to view.

Kali Linux 2020.2 Release - Penetration Testing and Ethical Hacking Linux...

We are incredibly excited to announce the second release of 2020, Kali Linux 2020.1.2A quick overview of what’s new since January:KDE Plasma Makeover & LoginPowerShell by Default. Kind of.Kali on...

View Article

Image may be NSFW.
Clik here to view.

Kaiten - A Undetectable Payload Generation

A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual consent is illegal. Developers assume no liability and are not...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>