Faraday 1.0.15 - Collaborative Penetration Test and Vulnerability Management...
A brand new version is ready for you to enjoy! Faraday v1.0.15 (Community, Pro & Corp) was published today with new exciting features.As a part of our constant commitment to the IT sec community we...
View ArticleBackBox Linux 4.4 - Ubuntu-based Linux Distribution Penetration Test and...
BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop...
View ArticleTwittor - A fully featured backdoor that uses Twitter as a C&C server
A stealthy Python based backdoor that uses Twitter (Direct Messages) as a command and control server This project has been inspired by Gcat which does the same but using a Gmail account. Setup For this...
View ArticleB374K - PHP Webshell with handy features
This PHP Shell is a useful tool for system or web administrator to do remote management without using cpanel, connecting using ssh, ftp etc. All actions take place within a web browser.Features : File...
View ArticleTheFuck - Magnificent App Which Corrects Your Previous Console Command
Few examples: ➜ apt-get install vimE: Could not open lock file /var/lib/dpkg/lock - open (13: Permission denied)E: Unable to lock the administration directory (/var/lib/dpkg/), are you root?➜ fucksudo...
View ArticleBtproxy - Man In The Middle Analysis Tool For Bluetooth
Tested Devices Pebble Steel smart watch Moto 360 smart watch OBDLink OBD-II Bluetooth Dongle Withings Smart Baby Monitor If you have tried anything else, please let me know at conorpp (at) vt (dot)...
View ArticleRubocop - A Ruby Static Code Analyzer, Based On The Community Ruby Style Guide
RuboCop is a Ruby static code analyzer. Out of the box it will enforce many of the guidelines outlined in the community Ruby Style Guide . Most aspects of its behavior can be tweaked via various...
View ArticleBurpkit - Next-Gen Burpsuite Penetration Testing Tool
Welcome to the next generation of web application penetration testing - using WebKit to own the web. BurpKit is a BurpSuite plugin which helps in assessing complex web apps that render the contents of...
View ArticleCSRFT - Cross Site Request Forgeries (Exploitation) Toolkit
This project has been developed to exploit CSRF Web vulnerabilities and provide you a quick and easy exploitation toolkit. In few words, this is a simple HTTP Server in NodeJS that will communicate...
View ArticleGping - Ping, But With A Graph
Ping, but with a graph Install and run Created/tested with Python 3.4, should run on 2.7 (will require the statistics module though). pip3 install pinggraphTested on Windows and Ubuntu, should run on...
View ArticleMobSF (Mobile Security Framework) - Mobile (Android/iOS) Automated...
Mobile Security Framework (MobSF) is an intelligent, all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. We've...
View ArticlePowercat - Netcat: The Powershell Version
Installationpowercat is a powershell function. First you need to load the function before you can execute it. You can put one of the below commands into your powershell profile so powercat is...
View ArticleXPL-SEARCH - Search Exploits In Multiple Exploit Databases
XPL SEARCH Search exploits in multiple exploit databases! Exploit databases available: * Exploit-DB * MIlw0rm * PacketStormSecurity * IntelligentExploit * IEDB * CVE TO RUN THE SCRIPT PHP Version...
View ArticleLMD - Linux Malware Detect
Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 license, that is designed around the threats faced in shared hosted environments. It uses threat data from network...
View ArticleZIB - The Open Tor Botnet
General information and instructions. The Open Tor Botnet requires the installation and configuration of bitcoind, however I neglect to detail this here out of a lack of time.This bot-net is fully...
View ArticleInfernal-Twin - This Is Evil Twin Attack Automated (Wireless Hacking)
This tool is created to aid the penetration testers in assessing wireless security. Author is not responsible for misuse. Please read instructions thoroughly.Usagesudo python InfernalWireless.pyHow to...
View ArticleARDT - Akamai Reflective DDoS Tool
Akamai Reflective DDoS Tool Attack the origin host behind the Akamai Edge hosts and bypass the DDoS protection offered by Akamai services.How it works...Based off the research done at NCC: (...
View ArticleKeeFarce - Extracts Passwords From A Keepass 2.X Database, Directly From Memory
KeeFarce allows for the extraction of KeePass 2.x password database information from memory. The cleartext information, including usernames, passwords, notes and url's are dumped into a CSV file in...
View ArticleSecurity Onion - Linux Distro For Intrusion Detection, Network Security...
Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, ELSA, Xplico,...
View ArticleTails 1.7 - The Amnesic Incognito Live System
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity, and helps you to:use the Internet...
View Article