Penbox - A Tool That Has All The Tools, Penetration Tester'S Repo
PenBox A Penetration Testing Framework , The Hacker's Repo our hope is in the last version we will have evry script that a hacker needs :) Requirements Python 2 sudoer Versions Version v1.1...
View ArticleBackdoorMe - Powerful Auto-Backdooring Utility
Backdoorme is a powerful utility capable of backdooring Unix machines with a slew of backdoors. Backdoorme uses a familiar metasploit interface with tremendous extensibility. Backdoorme relies on...
View ArticleBSQLinjector - Blind SQL Injection Exploitation Tool
BSQLinjector uses blind method to retrieve data from SQL databases. I recommend using "--test" switch to clearly see how configured payload looks like before sending it to an application.Options:...
View ArticleKillchain - A Unified Console To Perform The "Kill Chain" Stages Of Attacks
“Kill Chain” is a unified console with an anonymizer that will perform these stages of attacks: Reconnaissance Weaponization Delivery Exploit Installation Command & Control And Actions Dependant...
View ArticleRootHelper - A Bash Script That Downloads And Unzips Scripts That Will Aid...
RootHelper Roothelper will aid in the process of privilege escalation on a Linux system that has been compromised, by fetching a number of enumeration and exploit suggestion scripts. The latest...
View ArticleSimplyEmail - Email Recon Made Fast And Easy, With A Framework To Build On
What is the simple email recon tool? This tool was based off the work of theHarvester and kind of a port of the functionality. This was just an expansion of what was used to build theHarvester and will...
View ArticleProject Arsenal X - As HackTheGame But Real
Project Arsenal X New version of my Arsenal X written in Delphi with the following options: [+] Gmail Inbox [+] Whois Client [+] Table [+] Downloader [+] Get IP [+] Locate IP [+] K0bra SQLI Scanner...
View ArticleJShielder - LAMP/LEMP Secure Deployment
JSHielder is an Open Source tool developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application. This tool automates the process of installing...
View ArticleWiFi-Pumpkin - Framework For Rogue Wi-Fi Access Point Attack
WiFi-Pumpkin is security tool that provide the Rogue access point to Man-In-The-Middle and network attacks. purporting to provide wireless Internet services, but snooping on the traffic. can be used to...
View ArticlePotato - Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012
How it worksPotato takes advantage of known issues in Windows to gain local privilege escalation, namely NTLM relay (specifically HTTP->SMB relay) and NBNS spoofing.Using the techniques outlined...
View ArticleZizzania - Automated DeAuth Attack
zizzania sniffs wireless traffic listening for WPA handshakes and dumping only those frames suitable to be decrypted (one beacon + EAPOL frames + data). In order to speed up the process, zizzania sends...
View ArticleDnstwist - Domain Name Permutation Engine For Detecting Typo Squatting,...
See what sort of trouble users can get in trying to type your domain name. Find similar-looking domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud and...
View Articlep0wnedShell - PowerShell Runspace Post Exploitation Toolkit
p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and functions within a powershell runspace environment (.NET). It...
View ArticleWindows-Exploit-Suggester - Tool To Compares A Targets Patch Levels Against...
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits...
View ArticleV3n0M-Scanner - Popular SQLi and Pentesting Scanner
V3n0M runs on Python3 [Live Project - Readding old features back in and improved for Python3] v3n0m is a free and open source scanner. Evolved from baltazar's scanner, it has adapted several new...
View ArticleMetabrik - Perl Brik Platform
Smartphones have their apps, Web browsers have their apps, shells don’t. With Metabrik, we tried to merge the power of shells with the power of the Perl language by creating a platform allowing to...
View ArticleViper - Cracking Unix Passwords Brute Force
Viper is a prute force UNIX-style password cracker for passwords encrypt with crypt. It has been developed from Hale's viper 1.4 Perl program. While there are other more powerful crack programs out,...
View ArticleXXEinjector - Tool For Automatic Exploitation Of XXE Vulnerability
XXEinjector automates retrieving files using direct and out of band methods. Directory listing only works in Java applications. Bruteforcing method needs to be used for other applications.Options--host...
View ArticleFastIR Collector - Windows Incident Response Tool
This tool collects different artefacts on live Windows and records the results in csv files. With the analyses of this artefacts, an early compromission can be detected. Requirements pywin32 python WMI...
View ArticleGDB-Dashboard - Modular Visual Interface For Gdb In Python
Modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during...
View Article