Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

FinalRecon v1.1.0 - The Last Web Recon Tool You'll Need

FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results....

View Article


Image may be NSFW.
Clik here to view.

Go_Parser - Yet Another Golang Binary Parser For IDAPro

Yet Another Golang Binary Parser For IDAProï’¡NOTE: This master branch is written in Python2 for IDAPython, and tested only on IDA7.2/IDA7.0. If you use IDAPython with Python3 and higher version of...

View Article


Image may be NSFW.
Clik here to view.

Garud - An Automation Tool That Scans Sub-Domains, Sub-Domain Takeover And...

An automation tool that scans sub-domains, sub-domain takeover and then filters out xss, ssti, ssrf and more injection point parameters.Requirements: Go Language, Python 2.7 or Python 3. System...

View Article

Image may be NSFW.
Clik here to view.

MacC2 - Mac Command And Control That Uses Internal API Calls Instead Of...

MacC2 is a macOS post exploitation tool written in python that uses Objective C calls or python libraries as opposed to command line executions. The client is written in python2, which though...

View Article

Image may be NSFW.
Clik here to view.

Gping - Ping, But With A Graph

Ping, but with a graph.InstallFYI: The old Python version can be found under the python tag.Homebrew (MacOS + Linux)brew tap orf/brewbrew install gpingBinaries (Windows)Download the latest release from...

View Article


Image may be NSFW.
Clik here to view.

Rehex - Reverse Engineers' Hex Editor

A cross-platform (Windows, Linux, Mac) hex editor for reverse engineering, and everything else.FeaturesLarge (1TB+) file supportDecoding of integer/floating point value typesDisassembly of machine...

View Article

Image may be NSFW.
Clik here to view.

OpenEDR - Open EDR Public Repository

We at OpenEDR believe in creating a cybersecurity platform with its source code openly available to public, where products and services can be provisioned and managed together. EDR is our starting...

View Article

Image may be NSFW.
Clik here to view.

Teler - Real-time HTTP Intrusion Detection

teler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community.FeaturesReal-time: Analyze logs and...

View Article


Image may be NSFW.
Clik here to view.

Kali Linux 2020.4 - Penetration Testing and Ethical Hacking Linux Distribution

 Time for another Kali Linux release! – Kali Linux 2020.4. This release has various impressive updates:ZSH is the new default shell– We said it was happening last time, Now it has. ZSH. Is. Now....

View Article


Image may be NSFW.
Clik here to view.

Doctrack - Tool To Manipulate And Insert Tracking Pixels Into Office Open XML...

Tool to manipulate and insert tracking pixels into Office Open XML documents.FeaturesInsert tracking pixels into Office Open XML documents (Word and Excel)Inject template URL for remote template...

View Article

Image may be NSFW.
Clik here to view.

Bulwark - An Organizational Asset And Vulnerability Management Tool, With...

An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.Jira IntegrationNotePlease keep in mind, this project is in early...

View Article

Image may be NSFW.
Clik here to view.

Invoke-Antivm - Powershell Tool For VM Evasion

Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell.CompatibilityRun the script check-compatibility.ps1 to check what modules or functions...

View Article

Image may be NSFW.
Clik here to view.

Routopsy - A Toolkit Built To Attack Often Overlooked Networking Protocols

Routopsy is a toolkit built to attack often overlooked networking protocols. Routopsy currently supports attacks against Dynamic Routing Protocols (DRP) and First-Hop Redundancy Protocols (FHRP). Most...

View Article


Image may be NSFW.
Clik here to view.

Fuzzilli - A JavaScript Engine Fuzzer

A (coverage-)guided fuzzer for dynamic language interpreters based on a custom intermediate language ("FuzzIL") which can be mutated and translated to JavaScript.UsageThe basic steps to use this fuzzer...

View Article

Image may be NSFW.
Clik here to view.

SIRAS - Security Incident Response Automated Simulations

Security Incident Response Automated Simulations (SIRAS) are internal/controlled actions that provide a structured opportunity to practice the incident response plan and procedures during a realistic...

View Article


Image may be NSFW.
Clik here to view.

Amlsec - Automated Security Risk Identification Using AutomationML-based...

This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results of the risk identification...

View Article

Image may be NSFW.
Clik here to view.

Osi.Ig - Information Gathering Instagram

The InstagramOSINT Tool gets a range of information from an Instagram account that you normally wouldn't be able to get from just looking at their profileThe information includes:[ profile ] : user id,...

View Article


Image may be NSFW.
Clik here to view.

ToothPicker - An In-Process, Coverage-Guided Fuzzer For iOS

ToothPicker is an in-process, coverage-guided fuzzer for iOS. It was developed to specifically targets iOS's Bluetooth daemon bluetoothd and to analyze various Bluetooth protocols on iOS. As it is...

View Article

Image may be NSFW.
Clik here to view.

Xerror - Fully Automated Pentesting Tool

Xerror is an automated penetration tool , which will helps security professionals and non professionals to automate their pentesting tasks. Xerror will perform all tests and, at the end generate two...

View Article

Image may be NSFW.
Clik here to view.

UAFuzz - Binary-level Directed Fuzzing For Use-After-Free Vulnerabilities

Directed Greybox Fuzzing (DGF) like AFLGo aims to perform stress testing on pre-selected potentially vulnerable target locations, with applications to different security contexts: (1) bug reproduction,...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>