Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

O.G. AUTO-RECON - Enumerate A Target Based Off Of Nmap Results

Enumerate a target Based off of Nmap ResultsFeaturesThe purpose of O.G. Auto-Recon is to automate the initial information gathering phase and then enumerate based off those results as much as...

View Article


Image may be NSFW.
Clik here to view.

Lynis 3.0.0 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article


Image may be NSFW.
Clik here to view.

SAyHello - Capturing Audio (.Wav) From Target Using A Link

Capturing audio (.wav) from target using a linkHow it works?After the user grants microphone permissions, a website redirect button of your choice is released to distract the target while small audio...

View Article

Image may be NSFW.
Clik here to view.

TokenBreaker - JSON RSA To HMAC And None Algorithm Vulnerability POC

Token Breaker is focused on 2 particular vulnerability related to JWT tokens.None AlgorithmRSAtoHMACRefer to this link about insights of the vulnerability and how an attacker can forge the tokensTry...

View Article

Image may be NSFW.
Clik here to view.

InQL - A Burp Extension For GraphQL Security Testing

A security testing tool to facilitate GraphQL technology security auditing efforts.InQL can be used as a stand-alone script or as a Burp Suite extension.InQL Stand-Alone CLIRunning inql from Python...

View Article


Image may be NSFW.
Clik here to view.

Business Secure: How AI is Sneaking into our Restaurants

Prior to pandemic days, the restaurant industry talked of computers that might end up taking over their daily responsibilities. They’d joke about how a kiosk can communicate orders to the kitchen, much...

View Article

Image may be NSFW.
Clik here to view.

Hmmcookies - Grab Cookies From Firefox, Chrome, Opera Using A Shortcut File...

Grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC)Legal disclaimer:Usage of HMMCOOKIES for attacking targets without prior mutual consent is illegal. It's the end user's...

View Article

Image may be NSFW.
Clik here to view.

Sifter 7.4 - OSINT, Recon & Vulnerability Scanner

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote...

View Article


Image may be NSFW.
Clik here to view.

How to Free Recover Deleted Files on Your Mac

There are many scenarios where you would want to recover deleted data from your Mac. These deleted files could be your important photos, official documents, financial records, etc. Loss of such data...

View Article


Image may be NSFW.
Clik here to view.

CorsMe - Cross Origin Resource Sharing MisConfiguration Scanner

A Misconfiguration Scanner cors misconfiguration scanner tool based on golang with speed and precision in mind !Misconfiguration type this scanner can check forReflect Origin checksPrefix MatchSuffix...

View Article

Image may be NSFW.
Clik here to view.

Colabcat - Running Hashcat On Google Colab With Session Backup And Restore

Run Hashcat on Google Colab with session restore capabilities with Google Drive.UsageGo to the link below to open a copy of the colabcat.ipynb file in Google Colab:...

View Article

Image may be NSFW.
Clik here to view.

Spyse: All-In-One Cybersecurity Search Engine

Spyse is a cybersecurity search engine for finding technical information about different internet entities, business data, and vulnerabilities. It’s an all-in-one platform for fast and effortless...

View Article

Image may be NSFW.
Clik here to view.

Cloudtopolis - Cracking Hashes In The Cloud For Free

Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!).RequirementsHave 1...

View Article


Image may be NSFW.
Clik here to view.

VBSmin - VBScript Minifier

VBScript minifierFeaturesRemove extra whitespace Trailing whitespaceLeading whitespaceBlank linesInline extra spacesRemove comments Single quote (start of the line)Single quote (inline)REMOne-line Line...

View Article

Image may be NSFW.
Clik here to view.

Screenspy - Capture user screenshots using shortcut file (Bypass...

Capture user screenshots using shortcut file (Bypass SmartScreen/Defender). Suport Multi-monitorLegal disclaimer:Usage of ScreenSpy for attacking targets without prior mutual consent is illegal. It's...

View Article


Image may be NSFW.
Clik here to view.

Espionage - A Network Packet And Traffic Interceptor For Linux. Spoof ARP &...

Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows users to to run normal and verbose traffic analysis that shows a live feed...

View Article

Image may be NSFW.
Clik here to view.

BSF - Botnet Simulation Framework

BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate monitoring and countermeasures.SynopsisIn the arms race...

View Article


Image may be NSFW.
Clik here to view.

Xeexe - Undetectable And XOR Encrypting With Custom KEY (FUD Metasploit RAT)

Undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,...(PYTHON 3)Undetectable Reverse shell...

View Article

Image may be NSFW.
Clik here to view.

EvilNet - Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack...

Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../install :sudo pip3 install -r requirements.txtEvilNet Attack NetworkScan NetworkWifi AttackARP AttackBrute Force...

View Article

Image may be NSFW.
Clik here to view.

Kube-Bench - Checks Whether Kubernetes Is Deployed According To Security Best...

kube-bench is a Go application that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.Tests are configured with YAML files, making this...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>