Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

FisherMan - CLI Program That Collects Information From Facebook User Profiles...

Search for public profile information on FacebookInstallation# clone the repo$ git clone https://github.com/Godofcoffe/FisherMan# change the working directory to FisherMan$ cd FisherMan# install the...

View Article


Image may be NSFW.
Clik here to view.

PackageDNA - Tool To Analyze Software Packages Of Different Programming...

This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information...

View Article


Image may be NSFW.
Clik here to view.

Brutus - An Educational Exploitation Framework Shipped On A Modular And...

An educational exploitation framework shipped on a modular and highly extensible multi-tasking and multi-processing architecture. Brutus: an IntroductionLooking for version 1? See the branches in this...

View Article

Image may be NSFW.
Clik here to view.

XLMMacroDeobfuscator - Extract And Deobfuscate XLM Macros (A.K.A Excel 4.0...

XLMMacroDeobfuscator can be used to decode obfuscated XLM macros (also known as Excel 4.0 macros). It utilizes an internal XLM emulator to interpret the macros, without fully performing the code.It...

View Article

Image may be NSFW.
Clik here to view.

SQLancer - Detecting Logic Bugs In DBMS

SQLancer (Synthesized Query Lancer) is a tool to automatically test Database Management Systems (DBMS) in order to find logic bugs in their implementation. We refer to logic bugs as those bugs that...

View Article


Image may be NSFW.
Clik here to view.

Keimpx - Check For Valid Credentials Across A Network Over SMB

keimpx is an open source tool, released under the Apache License 2.0.It can be used to quickly check for valid credentials across a network over SMB. Credentials can be:Combination of user / plain-text...

View Article

Image may be NSFW.
Clik here to view.

Process-Dump - Windows Tool For Dumping Malware PE Files From Memory Back To...

Process Dump is a Windows reverse-engineering command-line tool to dump malware memory components back to disk for analysis. Often malware files are packed and obfuscated before they are executed in...

View Article

Image may be NSFW.
Clik here to view.

LazySign - Create Fake Certs For Binaries Using Windows Binaries And The...

Create fake certs for binaries using windows binaries and the power of bat filesOver the years, several cool tools have been released that are capeable of stealing or forging fake signatures for binary...

View Article


Image may be NSFW.
Clik here to view.

Git-Secret - Go Scripts For Finding An API Key / Some Keywords In Repository

Go scripts for finding an API key / some keywords in repositoryUpdate V1.0.1Removing some checkersAdding example file contains github dorksHow to Installgo get github.com/daffainfo/Git-SecretHow to...

View Article


Image may be NSFW.
Clik here to view.

DNSMonster - Passive DNS Capture/Monitoring Framework

Passive DNS collection and monitoring built with Golang, Clickhouse and Grafana: dnsmonster implements a packet sniffer for DNS traffic. It can accept traffic from a pcap file, a live interface or a...

View Article

Image may be NSFW.
Clik here to view.

PSPKIAudit - PowerShell toolkit for auditing Active Directory Certificate...

PowerShell toolkit for auditing Active Directory Certificate Services (AD CS).It is built on top of PKISolution's PSPKI toolkit (Microsoft Public License). This repo contains a newer version of PSPKI...

View Article

Image may be NSFW.
Clik here to view.

SLSA - Supply-chain Levels For Software Artifacts

SLSA (pronounced "salsa") is security framework from source to service, giving anyone working with software a common language for increasing levels of software security and supply chain integrity.The...

View Article

Image may be NSFW.
Clik here to view.

Dorkify - Perform Google Dork Search

Perform Google Dork search with DorkifyGoogle DorkingGoogle dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer code that websites use. Google...

View Article


Image may be NSFW.
Clik here to view.

BeaconEye - Hunts Out CobaltStrike Beacons And Logs Operator Command Output

BeaconEye scans running processes for active CobaltStrike beacons. When processes are found to be running beacon, BeaconEye will monitor each process for C2 activity.How it worksBeaconEye will scan...

View Article

Image may be NSFW.
Clik here to view.

adalanche - Active Directory ACL Visualizer and Explorer

Tags: API Documentation, Access, Active Directory, Analysis, Binary, LDAP, Linux, Max, Memory, Parameter, Reverse, Takeover, Windows, pwned, Adalancheadalanche - Active Directory ACL Visualizer - who's...

View Article


Image may be NSFW.
Clik here to view.

Ctf-Screenshotter - A CTF Web Challenge About Making Screenshots

A CTF web challenge about making screenshots. It is inspired by a bug found in real life. The challenge was created by @LiveOverflow for https://cscg.de/.Watch the video writeup here:...

View Article

Image may be NSFW.
Clik here to view.

Pantagrule - Large Hashcat Rulesets Generated From Real-World Compromised...

gargantuan hashcat rulesets generated from compromised passwordsProject maintenance warning: This project is deemed completed. No pull requests or changes will be made to this project in the future...

View Article


Image may be NSFW.
Clik here to view.

Huan - Encrypted PE Loader Generator

Huan is an encrypted PE Loader Generator that I developed for learning PE file structure and PE loading processes. It encrypts the PE file to be run with different keys each time and embeds it in a new...

View Article

Image may be NSFW.
Clik here to view.

MEAT - This Toolkit Aims To Help Forensicators Perform Different Kinds Of...

M.E.A.T. - Mobile Evidence Acquisition ToolkitMeet M.E.A.T!From Jack Farley - BlackStone DiscoveryThis toolkit aims to help forensicators perform different kinds of acquisitions on iOS devices (and...

View Article

Image may be NSFW.
Clik here to view.

PEzor - Open-Source Shellcode And PE Packer

Read the blog posts...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>