Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Toxy - Hackable Http Proxy To Simulate Server Failure Scenarios And Network...

Toxy is a fully programmatic and hackable HTTP proxy to simulate server failure scenarios and unexpected network conditions , built for node.js / io.js . It was mainly designed for fuzzing/evil testing...

View Article


Image may be NSFW.
Clik here to view.

Wireshark v2.0 - The World’s Foremost Network Protocol Analyzer

Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network. It is the de facto (and often de jure) standard...

View Article


Image may be NSFW.
Clik here to view.

Bluto - DNS Recon, DNS Zone Transfer, and Email Enumeration

BLUTO DNS recon | Brute forcer | DNS Zone Transfer | Email EnumerationThe target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records...

View Article

Image may be NSFW.
Clik here to view.

WAP - Web Application Protection

WAP is a source code static analysis and data mining tool to detect and correct input validation vulnerabilities in web applications written in PHP (version 4.0 or higher) with a low rate of false...

View Article

Image may be NSFW.
Clik here to view.

LiME - Linux Memory Extractor

A Loadable Kernel Module (LKM) which allows for volatile memory acquisition from Linux and Linux-based devices, such as Android. This makes LiME unique as it is the first tool that allows for full...

View Article


Image may be NSFW.
Clik here to view.

Codetainer - A Docker Container In Your Browser

codetainer allows you to create code 'sandboxes' you can embed in your web applications (think of it like an OSS clone of codepicnic.com ). Codetainer runs as a webservice and provides APIs to create,...

View Article

Image may be NSFW.
Clik here to view.

Beurk - Experimental Unix Rootkit

BEURK is an userland preload rootkit for GNU/Linux, heavily focused around anti-debugging and anti-detection.NOTE: BEURK is a recursive acronym for B EURK E xperimental U nix R oot K it Features Hide...

View Article

Image may be NSFW.
Clik here to view.

Pemcracker - Tool To Crack Encrypted PEM Files

This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to recover the password for encrypted PEM files while utilizing all the CPU cores.It still uses high level OpenSSL calls in...

View Article


Image may be NSFW.
Clik here to view.

PowerTools - Collection Of PowerShell Projects With A Focus On Offensive...

Veil's PowerTools are a collection of PowerShell projects with a focus on offensive operations.This collection contains five projects:PowerUpPowerBreachPowerPickPewPewPewPowerViewPowerUpPowerUp is a...

View Article


Image may be NSFW.
Clik here to view.

GetHead - HTTP Header Analysis Vulnerability Tool

gethead.py is a Python HTTP Header Analysis Vulnerability Tool. It identifies security vulnerabilities and the lack of protection in HTTP Headers.Usage:$ python gethead.py...

View Article

Image may be NSFW.
Clik here to view.

HTTPNetworkSniffer v1.50 - Packet Sniffer Tool That Captures All HTTP...

HTTPNetworkSniffer is a packet sniffer tool that captures all HTTP requests/responses sent between the Web browser and the Web server and displays them in a simple table. For every HTTP request, the...

View Article

Image may be NSFW.
Clik here to view.

Nmap 7 - Security Scanner For Network Exploration & Security Audits

Nmap (“Network Mapper”) is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for network inventory,...

View Article

Image may be NSFW.
Clik here to view.

Hsecscan - A Security Scanner For HTTP Response Headers

hsecscanA security scanner for HTTP response headers. Requirements Python 2.x Usage $ ./hsecscan.py usage: hsecscan.py [-h] [-P] [-p] [-u URL] [-R] [-U User-Agent] [-d 'POST data'] [-x PROXY]A security...

View Article


Image may be NSFW.
Clik here to view.

Aircrack-ng 1.2 RC 3 - WEP and WPA-PSK Keys Cracking Program

Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations...

View Article

Image may be NSFW.
Clik here to view.

UserProfilesView - View User Profiles Information On Your Windows

UserProfilesView displays the list of all user profiles that you currently have in your system. For each user profile, the following information is displayed: Domain\User Name, Profile Path, Last Load...

View Article


Image may be NSFW.
Clik here to view.

Sniffly - Sniffing Browser History Using HSTS + CSP.

Sniffly is an attack that abuses HTTP Strict Transport Security and Content Security Policy to allow arbitrary websites to sniff a user's browsing history. It has been tested in Firefox and Chrome....

View Article

Image may be NSFW.
Clik here to view.

REXT - Router Exploitation Toolkit

Small toolkit for easy creation and usage of various python scripts that work with embedded devices. core - contains most of toolkits basic functions databases - contains databases, like default...

View Article


Image may be NSFW.
Clik here to view.

BlackArch Linux v2015.11.24 - Penetration Testing Distribution

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1308 tools. You can install tools individually or in groups. BlackArch...

View Article

Image may be NSFW.
Clik here to view.

Bohatei - Flexible and Elastic DDoS Defense

Bohatei is a first of its kind platform that enables flexible and elastic DDoS defense using SDN and NFV.The repository contains a first version of the components described in the Bohatei paper, as...

View Article

Image may be NSFW.
Clik here to view.

Wordbrutepress - Wordpress Brute Force Multithreading with Standard and...

Wordpress Brute Force Multithreading with standard and xml-rpc login method written in python.Features:Multithreadingxml-rpc brute force modehttp and https protocols supportRandom User AgentBig...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>