Toxy - Hackable Http Proxy To Simulate Server Failure Scenarios And Network...
Toxy is a fully programmatic and hackable HTTP proxy to simulate server failure scenarios and unexpected network conditions , built for node.js / io.js . It was mainly designed for fuzzing/evil testing...
View ArticleWireshark v2.0 - The World’s Foremost Network Protocol Analyzer
Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard...
View ArticleBluto - DNS Recon, DNS Zone Transfer, and Email Enumeration
BLUTO DNS recon | Brute forcer | DNS Zone Transfer | Email EnumerationThe target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records...
View ArticleWAP - Web Application Protection
WAP is a source code static analysis and data mining tool to detect and correct input validation vulnerabilities in web applications written in PHP (version 4.0 or higher) with a low rate of false...
View ArticleLiME - Linux Memory Extractor
A Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full...
View ArticleCodetainer - A Docker Container In Your Browser
codetainer allows you to create code 'sandboxes' you can embed in your web applications (think of it like an OSS clone of codepicnic.com ). Codetainer runs as a webservice and provides APIs to create,...
View ArticleBeurk - Experimental Unix Rootkit
BEURK is an userland preload rootkit for GNU/Linux, heavily focused around anti-debugging and anti-detection.NOTE: BEURK is a recursive acronym for B EURK E xperimental U nix R oot K it Features Hide...
View ArticlePemcracker - Tool To Crack Encrypted PEM Files
This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to recover the password for encrypted PEM files while utilizing all the CPU cores.It still uses high level OpenSSL calls in...
View ArticlePowerTools - Collection Of PowerShell Projects With A Focus On Offensive...
Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.This collection contains five projects:PowerUpPowerBreachPowerPickPewPewPewPowerViewPowerUpPowerUp is a...
View ArticleGetHead - HTTP Header Analysis Vulnerability Tool
gethead.py is a Python HTTP Header Analysis Vulnerability Tool. It identifies security vulnerabilities and the lack of protection in HTTP Headers.Usage:$ python gethead.py...
View ArticleHTTPNetworkSniffer v1.50 - Packet Sniffer Tool That Captures All HTTP...
HTTPNetworkSniffer is a packet sniffer tool that captures all HTTP requests/responses sent between the Web browser and the Web server and displays them in a simple table. For every HTTP request, the...
View ArticleNmap 7 - Security Scanner For Network Exploration & Security Audits
Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for network inventory,...
View ArticleHsecscan - A Security Scanner For HTTP Response Headers
hsecscanA security scanner for HTTP response headers. Requirements Python 2.x Usage $ ./hsecscan.py usage: hsecscan.py [-h] [-P] [-p] [-u URL] [-R] [-U User-Agent] [-d 'POST data'] [-x PROXY]A security...
View ArticleAircrack-ng 1.2 RC 3 - WEP and WPA-PSK Keys Cracking Program
Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations...
View ArticleUserProfilesView - View User Profiles Information On Your Windows
UserProfilesView displays the list of all user profiles that you currently have in your system. For each user profile, the following information is displayed: Domain\User Name, Profile Path, Last Load...
View ArticleSniffly - Sniffing Browser History Using HSTS + CSP.
Sniffly is an attack that abuses HTTP Strict Transport Security and Content Security Policy to allow arbitrary websites to sniff a user's browsing history. It has been tested in Firefox and Chrome....
View ArticleREXT - Router Exploitation Toolkit
Small toolkit for easy creation and usage of various python scripts that work with embedded devices. core - contains most of toolkits basic functions databases - contains databases, like default...
View ArticleBlackArch Linux v2015.11.24 - Penetration Testing Distribution
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1308 tools. You can install tools individually or in groups. BlackArch...
View ArticleBohatei - Flexible and Elastic DDoS Defense
Bohatei is a first of its kind platform that enables flexible and elastic DDoS defense using SDN and NFV.The repository contains a first version of the components described in the Bohatei paper, as...
View ArticleWordbrutepress - Wordpress Brute Force Multithreading with Standard and...
Wordpress Brute Force Multithreading with standard and xml-rpc login method written in python.Features:Multithreadingxml-rpc brute force modehttp and https protocols supportRandom User AgentBig...
View Article