OWASP VBScan 0.1.6 - Black Box vBulletin Vulnerability Scanner Tool
OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them .Why OWASP VBScan ?If you...
View ArticlePhishing Frenzy - Ruby on Rails Phishing Framework
Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns.The project was started in 2013 by the founder Brandon "zeknox"...
View ArticleSkydive - An Open Source Real-Time Network Topology and Protocols Analyzer
Skydive is an open source real-time network topology and protocols analyzer. It aims to provide a comprehensive way of understanding what is happening in the network infrastructure.Skydive agents...
View ArticleHostedNetworkStarter - Wifi Hotspot Creator for Windows 10/8/7
HostedNetworkStarter is a simple tool for Windows 7 and later that allows you to easily create a wifi hotspot with your wireless network adapter, using the Wifi hosted network feature of Windows...
View ArticleLitesploit - Library and Intepreter for Penetration Testing Tools
Litesploit is a library and intepreter for penetration testing tools. This includes exploits, tools and litepreter.Litesploit support for Linux like ubuntu or debian, and more distro penetration...
View ArticleCANToolz aka YACHT (Yet Another Car Hacking Tool) - Framework for Black-Box...
CANToolz is a framework for analysing CAN networks and devices. This tool based on different modules which can be assembled in pipe together and can be used by security researchers and automotive/OEM...
View ArticlesIPI - Simple IP Information Tools
This tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do search looking for reputation info from a set of open threat...
View ArticleAirgeddon - A Multi-use Bash Script for Linux Systems to Audit Wireless Networks
Features Interface mode switcher (Monitor-Managed). DoS over wireless networks with different methods. Assisted Handshake file capture. Cleaning and optimizing Handshake captured files. Offline...
View ArticleRSPET - Python Reverse Shell and Post Exploitation Tool
RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post exploitation scenario. Features Remote Command Execution Trafic...
View ArticleCJExploiter - Drag and Drop ClickJacking Exploit Development Assistance Tool
CJExploiter is drag and drop ClickJacking exploit development assistance tool. First open the "index.html" with your browser locally and enter target URL and click on "View Site". You can dynamically...
View ArticleMarfil - An Extension of the Aircrack-ng Suite used to assess WiFi Network...
Marfil is an extension of the Aircrack-ng suite, used to assess WiFi network security. It allows to split the work of performing long running dictionary attacks among many computers. Motivation The...
View ArticleWiFi-Pumpkin v0.7.5 - Framework for Rogue Wi-Fi Access Point Attack
WiFi-Pumpkin is a security tool that provides the Rogue access point to Man-In-The-Middle and network attacks. Installation Kali 2.0/WifiSlax 4.11.1/Parrot 2.0.5 Python 2.7 git clone...
View ArticleNetdata - Real-Time Performance Monitoring
netdata is a highly optimized Linux daemon providing real-time performance monitoring for Linux systems, Applications, SNMP devices, over the web ! It tries to visualize the truth of now , in its...
View ArticleEhTrace - Tool for Tracing Execution of Binaries on Windows
Eh'Trace (pronounced ATrace) is a binary tracing tool for Windows. Implemented in C but has some interesting properties that may make it suitable for tracing binaries when other methods are not...
View Articletransfer.sh - Easy and Fast File Sharing from the Command-line
Easy and fast file sharing from the command-line. This code contains the server with everything you need to create your own instance. Transfer.sh support currently the s3 (Amazon S3) provider and local...
View ArticleDoork - Google Dorks Passive Vulnerability Auditor
doork is a open-source passive vulnerability auditor tool that automates the process of searching on Google information about specific website based on dorks. doork can update his own database from...
View ArticleClair - Vulnerability Static Analysis for Containers
Clair is an open source project for the static analysis of vulnerabilities in appc and docker containers. Vulnerability data is continuously imported from a known set of sources and correlated with the...
View ArticleShellsploit - New Generation Exploit Development Kit
Shellsploit let's you generate customized shellcodes, backdoors, injectors for various operating system. And let's you obfuscation every byte via encoders. Install/Uninstall If you want to use...
View ArticleSMBCrunch - 3 Tools that Work Together to Simplify Reconaissance of Windows...
One of the most time consuming tasks as a red teamer is diving into filesystems and shares, attempting to identify any potentially sensitive information. SMBCrunch allows a red teamer to quickly...
View ArticleAutoNessus - Script to Communicate with Nessus API
This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, you can list all scans, list all policies, start, stop, pause,...
View Article