Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Sn1per - Automated Pentest Recon Scanner

Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.FeaturesAutomatically collects basic recon (ie. whois, ping, DNS, etc.)Automatically...

View Article


Image may be NSFW.
Clik here to view.

Wfuzz - The Web Application Bruteforcer

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking...

View Article


Image may be NSFW.
Clik here to view.

ZAP 2.4.2 - Penetration Testing Tool for Testing Web Applications

The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications. It is designed to be used by people with a wide range of security...

View Article

Image may be NSFW.
Clik here to view.

Pentoo 2015 - Security-Focused Livecd based on Gentoo

Pentoo is a Live CD and Live USB designed for penetration testing and security assessment. Based on Gentoo Linux, Pentoo is provided both as 32 and 64 bit installable livecd. Pentoo is also available...

View Article

Image may be NSFW.
Clik here to view.

Speedtest - Command Line Interface for Testing Internet Bandwidth

speedtest-cli is a command line interface for testing internet bandwidth using speedtest.netInstallationpip / easy_installpip install speedtest-clioreasy_install speedtest-cliGithubpip install...

View Article


Image may be NSFW.
Clik here to view.

Weevely3 - Weaponized Web Shell

Weevely is a command line web shell dynamically extended over the network at runtime designed for remote administration and pen testing. It provides a weaponized telnet-like console through a PHP...

View Article

Image may be NSFW.
Clik here to view.

WPHardening 1.5 - Fortify the security of any WordPress installation

Fortify the security of any WordPress installation.InstallationInstalling WPHardening requires you to execute one console command:$ pip install -r requirements.txtUsage$ python wphardening.py -h __...

View Article

Image may be NSFW.
Clik here to view.

CrackMapExec - A swiss army knife for pentesting Windows/Active Directory...

CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments!From enumerating logged on users and spidering SMB shares to executing psexec style attacks and auto-injecting...

View Article


Image may be NSFW.
Clik here to view.

Evil FOCA - MITM, DoS, DNS Hijacking in IPv4 and IPv6 Penetration Testing Tool

Evil Foca is a tool for security pentesters and auditors whose purpose it is to test security in IPv4 and IPv6 data networks. The tool is capable of carrying out various attacks such as:MITM over IPv4...

View Article


Image may be NSFW.
Clik here to view.

MALHEUR - Automatic Analysis of Malware Behavior

A novel tool for malware analysisMalheur is a tool for the automatic analysis of malware behavior (program behavior recorded from malicious software in a sandbox environment). It has been designed to...

View Article

Image may be NSFW.
Clik here to view.

PEInjector - MITM PE file infector

The executable file format on the Windows platform is PE COFF. The peinjector provides different ways to infect these files with custom payloads without changing the original functionality. It creates...

View Article

Image may be NSFW.
Clik here to view.

Tiger - The Unix security audit and intrusion detection tool

Tiger is a security tool that can be use both as a security audit and intrusion detection system. It supports multiple UNIX platforms and it is free and provided under a GPL license. Unlike other...

View Article

Image may be NSFW.
Clik here to view.

DNSteal - DNS Exfiltration tool for stealthily sending files over DNS requests

This is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below is an image showing an example of how to use:On the victim machine, you simply...

View Article


Image may be NSFW.
Clik here to view.

Windows Spy Keylogger - Software to Log Keystrokes in Stealth Mode for...

Windows Spy Keylogger is the free software to help you covertly monitor all activities on your computer.It intercepts everything that is typed on keyboard and stores into one log file which you can...

View Article

Image may be NSFW.
Clik here to view.

Pupy - Multi-Platform Remote Administration Tool

Pupy is an opensource, multi-platform Remote Administration Tool written in Python. On Windows, Pupy uses reflective dll injection and leaves no traces on disk.Features :On windows, the Pupy payload is...

View Article


Image may be NSFW.
Clik here to view.

Gryffin - Large Scale Web Security Scanning Platform

Gryffin is a large scale web security scanning platform. It is not yet another scanner. It was written to solve two specific problems with existing scanners: coverage and scale. Better coverage...

View Article

Image may be NSFW.
Clik here to view.

Heartbleed Vulnerability Scanner - Network Scanner for OpenSSL Memory Leak...

Heartbleed Vulnerability Scanner is a multiprotocol (HTTP, IMAP, SMTP, POP) CVE-2014-0160 scanning and automatic exploitation tool written with python.For scanning wide ranges automatically, you can...

View Article


Image may be NSFW.
Clik here to view.

Weeman - HTTP Server for Phishing

HTTP server for phishing in python. Weeman has support for most of the (bigest) websites.Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap).Weeman will do the following...

View Article

Image may be NSFW.
Clik here to view.

QARK - Tool to look for several security related Android application...

Quick Android Review Kit - This tool is designed to look for several security related Android application vulnerabilities, either in source code or packaged APKs. The tool is also capable of creating...

View Article

Image may be NSFW.
Clik here to view.

ZeroNet - Decentralized websites using Bitcoin crypto and BitTorrent network

Decentralized websites using Bitcoin crypto and the BitTorrent network - http://zeronet.ioWhy?We believe in open, free, and uncensored network and communication.No single point of failure: Site remains...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>