Proxenet - Hacker Friendly Proxy for Web Application Penetration Tests
Proxenet is a hacker friendly proxy for web application penetration tests.proxenet is a multi-threaded proxy which allows you manipulate your HTTP requests and responses using your favorite scripting...
View ArticleMITMf - Framework for Man-In-The-Middle attacks
Framework for Man-In-The-Middle attacksAvailable pluginsSMBtrap - Exploits the 'SMB Trap' vulnerability on connected clientsScreenshotter - Uses HTML5 Canvas to render an accurate screenshot of a...
View ArticleBruteX - Automatically Brute Force all Services Running on a Target
Automatically brute force all services running on a target including:Open portsDNS domainsWeb filesWeb directoriesUsernamesPasswordsUSAGE./brutex targetDEPENDENCIESNMapHydraWfuzzSNMPWalkDNSDictTo brute...
View ArticleMedusa - Speedy, Parallel and Modular Login Brute-Forcer
Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following...
View ArticleChrome Autofill Viewer - Tool to View or Delete Autocomplete data from Google...
Chrome Autofill Viewer is the free tool to easily see and delete all your autocomplete data from Google Chrome browser. Chrome stores Autofill entries (typically form fields) such as login name, pin,...
View ArticleREMnux v6 - A Linux Toolkit for Reverse-Engineering and Analyzing Malware
REMnux is a free Linux toolkit for assisting malware analysts with reverse-engineering malicious software. It strives to make it easier for forensic investigators and incident responders to start using...
View ArticleCrouton - Chromium OS Universal Chroot Environment
crouton is a set of scripts that bundle up into an easy-to-use, Chromium OS-centric chroot generator. Currently Ubuntu and Debian are supported (using debootstrap behind the scenes), but "Chromium OS...
View Articleicmpsh - Simple Reverse ICMP Shell
Sometimes, network administrators make the penetration tester's life harder. Some of them do use firewalls for what they are meant to, surprisingly! Allowing traffic only onto known machines, ports and...
View ArticleCupp - Common User Passwords Profiler
The most common form of authentication is the combination of a username and a password or passphrase. If both match values stored within a locally stored table, the user is authenticated for a...
View ArticleGcat - A stealthy Backdoor that uses Gmail as a command and control server
A stealthy Python based backdoor that uses Gmail as a command and control server.Setup For this to work you need:A Gmail account (Use a dedicated account! Do not use your personal one!)Turn on "Allow...
View ArticleVBS-Obfuscator - VBScript obfuscation to allow PenTesters bypass countermeasures
VBScript obfuscation to allow PenTesters bypass countermeasures.Sample Script OutputC:\tools>python obfuscator.py test.vbs out.vbsChar 109 -> 5505-5396Char 115 -> 1113775/9685Char 103 ->...
View ArticleCheat - Create and view interactive cheatsheets on the command-line
cheat allows you to create and view interactive cheatsheets on the command-line. It was designed to help remind *nix system administrators of options for commands that they use frequently, but not...
View ArticleSecurity CheatSheets - A collection of cheatsheets for various infosec tools...
These security cheatsheets are part of a project for the Ethical Hacking and Penetration Testing course offered at the University of Florida. Expanding on the default set of cheatsheets, the purpose of...
View ArticleJust-Metadata - Tool that Gathers and Analyzes Metadata about IP Addresses
Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen....
View ArticleTeemIp - IP Address Management Solution
All network administrators do recognize how important it is to have a well managed IP space: a comprehensive and up to date inventory of all subnets and IPs used in a network as well as clear and...
View ArticleVBScan - An Black Box vBulletin Vulnerability Scanner
VBScan is a Black Box vBulletin vulnerability scanner. Written in PerlDemo on youtube:Security Bug Found by VBScan in Ubuntu / Fedora/ python forums by VBScan Vulnerability ScannerReport any bug to :...
View ArticleAcunetix v10 - Web Application Security Testing Tool
Acunetix, the pioneer in automated web application security software, has announced the release of version 10 of its Vulnerability Scanner. New features are designed to prevent the risk of hacking for...
View ArticlePoet - A simple Post-Exploitation Tool
The client program runs on the target machine and is configured with an IP address (the server) to connect to and a frequency to connect at. If the server isn't running when the client tries to...
View ArticleSQLMAP-Web-GUI - Web GUI to drive near full functionality of SQLMAP
PHP Frontend to work with the SQLMAP JSON API Server (sqlmapapi.py) to allow for a Web GUI to drive near full functionality of SQLMAP!Here is a few quick videos to show that almost all of your usual...
View ArticleSquert - A Simple QUEry and Report Tool
Squert is a web application that is used to query and view event data stored in a Sguil database (typically IDS alert data). Squert is a visual tool that attempts to provide additional context to...
View Article