Xplico v1.1.1 - Open Source Network Forensic Analysis Tool (NFAT)
The goal of Xplico is extract from an internet traffic capture the applications data contained.For example, from a pcap file Xplico extracts each email (POP, IMAP, and SMTP protocols), all HTTP...
View ArticleKatana - Framework for Hackers, Professional Security and Developers
Katana is a framework written in python for making penetration testing, based on a simple and comprehensive structure for anyone to use, modify and share, the goal is to unify tools serve for...
View ArticleSpiderFoot v2.6.1 - Open Source Intelligence Automation
SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target.Purpose There are three main areas where SpiderFoot can be...
View Article0d1n - Tool For Automating Customized Attacks Against Web Applications
Web security tool to make fuzzing at HTTP inputs, made in C with libCurl.You can do:brute force passwords in auth formsdirectory disclosure ( use PATH list to brute, and find HTTP status code )test...
View ArticleoclHashcat v2.01 - Worlds Fastest Password Cracker
oclHashcat is the world's fastest and most advanced GPGPU-based password recovery utility, supporting five unique modes of attack for over 170 highly-optimized hashing algorithms. oclHashcat currently...
View ArticleWaldo - Multithreaded Directory and Subdomain Bruteforcer
Waldo is a lightweight and multithreaded directory and subdomain bruteforcer implemented in Python. It can be used to locate hidden web resources and undiscovered subdomains of the specified target.Key...
View ArticleXiaopan OS - Pentesting Distribution for Wireless Security Enthusiasts
Xiaopan OS is an easy to use software package for beginners and experts that includes a number of advanced tools to penetrate wireless networks. Based on the Tiny Core Linux (TCL) operating system...
View ArticleTor Messenger - Chat over Tor, Easily
Tor Messenger is a cross-platform chat program that aims to be secure by default and sends all of its traffic over Tor. It supports a wide variety of transport networks, including Jabber (XMPP), IRC,...
View ArticleMassBleed - Mass SSL Vulnerability Scanner
USAGE sh massbleed.sh [CIDR|IP] [single|port|subnet] [port] [proxy]ABOUTThis script has four main functions with the ability to proxy all connections:To mass scan any CIDR range for OpenSSL...
View ArticleUSBTracker - Script to track USB devices events and artifacts in a Windows OS
USBTracker is a quick & dirty coded incident response and forensics Python script to dump USB related information and artifacts from a Windows OS (vista and later). Special recommandations...
View ArticleJoomlavs - A Black Box, Joomla Vulnerability Scanner
JoomlaVS is a Ruby application that can help automate assessing how vulnerable a Joomla installation is to exploitation. It supports basic finger printing and can scan for vulnerabilities in...
View ArticleMosca - Static Analysis Tool To Find Bugs
Just another Simple static analysis tool to find bugs like a grep unix command, at mosca have a modules, that was call egg, each egg is a simple config to find bug at especific language like...
View ArticleFlashlight - Automated Information Gathering Tool for Penetration Testers
Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather information rapidly on target networks. So Flashlight should be...
View ArticleCollection Of Awesome Honeypots
A curated list of awesome honeypots, tools, components and much more. The list is divided into categories such as web, services, and others, focusing on open source projects.HoneypotsDatabase...
View ArticlePyersinia - Network Attack Tool
Pyersinia is a similar tool to Yersinia, but Pyersinia is implemented in Python using Scapy. The main objective is the realization of network attacks such as spoofing ARP, DHCP DoS , STP DoS among...
View ArticleATSCAN - Server, Site and Dork Scanner
Description:ATSCAN Version 2 Dork scanner. XSS scanner. Sqlmap. LFI scanner.Filter wordpress and Joomla sites in the server. Find Admin page.Decode / Encode MD5 + Base64. Libreries to install: ap-get...
View Articlecredmap - The Credential Mapper
Credmap is an open source tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the...
View ArticleAres - Python Botnet and Backdoor
Ares is made of two main programs:A Command aNd Control server, which is a Web interface to administer the agentsAn agent program, which is run on the compromised host, and ensures communication with...
View ArticleDomi-Owned - Tool Used for Compromising IBM/Lotus Domino Servers
Domi-Owned is a tool used for compromising IBM/Lotus Domino servers. Tested on IBM/Lotus Domino 8.5.2, 8.5.3, 9.0.0, and 9.0.1 running on Windows and Linux.UsageA valid username and password is not...
View ArticleYaVol - GUI for Volatility Framework and Yara
This is just another GUI for volatility and yara which could make someone's life easier. It is inteded for Incident responders for quick examination of a memory image. Results are stored in sqlite db...
View Article