Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

VAST - Visibility Across Space And Time

The network telemetry engine for data-driven security investigations.Getting Started— Installation— Documentation— Development— Changelog— License and Scientific UseChat with us on Gitter, or join us...

View Article


Image may be NSFW.
Clik here to view.

Short story about Clubhouse user scraping and social graphs

TL;DRDuring this RedTeam testing, Hexway team used Clubhouse as a social engineering tool to find out more about their client’s employees.UPDATE:While Hexway were preparing this article for...

View Article


Image may be NSFW.
Clik here to view.

APSoft-Web-Scanner-v2 - Powerful Dork Searcher And Vulnerability Scanner For...

APSoft Webscanner Version 2new version of APSoft Webscanner Version 1Software picturesWhat can i do with this ?with this software, you will be able to search your dorks in supported search engines and...

View Article

Image may be NSFW.
Clik here to view.

ByeIntegrity-UAC - Bypass UAC By Hijacking A DLL Located In The Native Image...

Bypass User Account Control (UAC) to gain elevated (Administrator) privileges to run any program at a high integrity level. RequirementsAdministrator accountUAC notification level set to default or...

View Article

Image may be NSFW.
Clik here to view.

Snuffleupagus - Security Module For Php7 And Php8 - Killing Bugclasses And...

Security module for php7 and php8 - Killing bugclasses and virtual-patching the rest!Snuffleupagus is a PHP 7+ and 8+ module designed to drastically raise the cost of attacks against websites, by...

View Article


Image may be NSFW.
Clik here to view.

3klCon - Automation Recon Tool Which Works With Large And Medium Scope

Full Automation Recon tool which works with Small and Medium scopes.Ù‘It's recommended to use it on VPS, it'll discoversecrets and searching for vulnerabilitiesSo, Welcome and let's deep into it...

View Article

Image may be NSFW.
Clik here to view.

R77-Rootkit - Fileless Ring 3 Rootkit With Installer And Persistence That...

Ring 3 rootkitr77 is a ring 3 Rootkit that hides following entities from all processes:Files, directories, junctions, named pipes, scheduled tasksProcessesCPU usageRegistry keys & valuesServicesTCP...

View Article

Image may be NSFW.
Clik here to view.

Mubeng - An Incredibly Fast Proxy Checker And IP Rotator With Ease

An incredibly fast proxy checker& IP rotator with ease.FeaturesProxy IP rotator: Rotates your IP address for every specific request.Proxy checker: Check your proxy IP which is still alive.All...

View Article


Image may be NSFW.
Clik here to view.

Httpx - A Fast And Multi-Purpose HTTP Toolkit Allows To Run Multiple Probers...

httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads.FeaturesSimple and...

View Article


Image may be NSFW.
Clik here to view.

CIMplant - C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote...

C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current user's session.Note: Some commands will use PowerShell in combination with WMI,...

View Article

Image may be NSFW.
Clik here to view.

Red-Kube - Red Team K8S Adversary Emulation Based On Kubectl

Red Kube is a collection of kubectl commands written to evaluate the security posture of Kubernetes clusters from the attacker's perspective.The commands are either passive for data collection and...

View Article

Image may be NSFW.
Clik here to view.

DFIR-O365RC - PowerShell Module For Office 365 And Azure AD Log Collection

PowerShell module for Office 365 and Azure AD log collectionModule description The DFIR-O365RC PowerShell module is a set of functions that allow the DFIR analyst to collect logs relevant for Office...

View Article

Image may be NSFW.
Clik here to view.

Eyeballer - Convolutional Neural Network For Analyzing Pentest Screenshots

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like...

View Article


Image may be NSFW.
Clik here to view.

Corsair_Scan - A Security Tool To Test Cross-Origin Resource Sharing (CORS)

Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources on a web page to be requested from another domain...

View Article

Image may be NSFW.
Clik here to view.

Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel...

Mediator is an end-to-end encrypted reverse shell in which the operator and the shell connect to a "mediator" server that bridges the connections. This removes the need for the operator/handler to set...

View Article


Image may be NSFW.
Clik here to view.

Msldap - LDAP Library For Auditing MS AD

msldapLDAP library for MS ADDocumentationAwesome documentation here!FeaturesComes with a built-in console LDAP clientAll parameters can be conrolled via a conveinent URL (see below)Supports integrated...

View Article

Image may be NSFW.
Clik here to view.

Ghidra-Evm - Module For Reverse Engineering Smart Contracts

In the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant amount of stolen funds due to programming mistakes. Since smart contracts, once...

View Article


Image may be NSFW.
Clik here to view.

IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often...

IPED is an open source software that can be used to process and analyze digital evidence, often seized at crime scenes by law enforcement or in a corporate investigation by private...

View Article

Image may be NSFW.
Clik here to view.

Etherblob-Explorer - Search And Extract Blob Files On The Ethereum Blockchain...

Search and extract blob files on the Ethereum network using Etherscan.io API.IntroductionEtherBlob Explorer is a tool intended for researchers, analysts, CTF players or anyone curious enough wanting to...

View Article

Image may be NSFW.
Clik here to view.

ABPTTS - TCP Tunneling Over HTTP/HTTPS For Web Application Servers

A Black Path Toward The Sun(TCP tunneling over HTTP for web application servers)https://www.blackhat.com/us-16/arsenal.html#a-black-path-toward-the-sunBen Lincoln, NCC Group, 2016ABPTTS uses a Python...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>