stickyKeysHunter - A Script to Test an RDP Host for Sticky Keys and Utilman...
This bash script tests for sticky keys and utilman backdoors. The script will connect to an RDP server, send both the sticky keys and utilman triggers and screenshot the result. How does it work?...
View ArticleWarBerryPi - Turn your Raspberry Pi into a War Machine
The WarBerry was built with one goal in mind; to be used in red teaming engagement where we want to obtain as much information as possible in a short period of time with being as stealth as possible....
View ArticleFaraday v1.0.20 - Collaborative Penetration Test and Vulnerability Management...
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the...
View ArticleBt2 - Blaze Telegram Backdoor Toolkit
bt2 is a Python-based backdoor in form of a IM bot that uses the infrastructure and the feature-rich bot API provided by Telegram, slightly repurposing its communication platform to act as a C&C....
View ArticleBurpSuiteJSBeautifier - Burp Suite JavaScript Beautifier
Most of the websites compress their resources such as JS files in order to increase the loading speed. However, security testing and debugging a compressed resource is not an easy task. This is a Burp...
View ArticleIntercepter-NG v1.9 - Multifunctional Network Toolkit for Android
Intercepter-NG is a multifunctional network toolkit for various types of IT specialists. It has functionality of several famous separate tools and more over offers a good and unique alternative of...
View ArticleWifiChannelMonitor - Monitor APs and Wifi clients on selected channel...
WifiChannelMonitor is a utility for Windows that captures wifi traffic on the channel you choose, using Microsoft Network Monitor capture driver in monitor mode, and displays extensive information...
View ArticleNpcap - the Nmap Project's packet sniffing library for Windows
Npcap is an update of WinPcap to NDIS 6 Light-Weight Filter (LWF) technique. It supports Windows Vista, 7, 8 and 10 . It is sponsored by the Nmap Project and developed by Yang Luo under Google Summer...
View ArticleWAFW00F - Identifies and Fingerprints Web Application Firewall (WAF) Products
WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. How does it work? To do its magic, WAFW00F does the following: Sends a normal HTTP request...
View ArticleParrot OS 3.0 (Lithium) - Friendly OS designed for Pentesting, Computer...
Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian...
View ArticleTor Browser 6.0 - Everything you Need to Safely Browse the Internet
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from...
View ArticleTails 2.4 - The Amnesic Incognito Live System
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no...
View ArticleArchStrike - Security Layer for Arch Linux
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, and ARMv7. ArchStrike is a penetration testing and security layer on top...
View ArticleFirefox Security Toolkit - A Tool that Transforms Firefox Browsers into a...
A tool that transforms Firefox Browsers into a penetration testing suite How? It downloads the most important extensions, and install it on your browser. The used extensions has been chosen by a...
View ArticleDetux - The Multiplatform Linux Sandbox
Detux is a sandbox developed to do traffic analysis of the Linux malwares and capture the IOCs by doing so. QEMU hypervisor is used to emulate Linux (Debian) for various CPU architectures. The...
View ArticleXssPy - Web Application XSS Scanner
XssPy is a python tool for finding Cross Site Scripting vulnerabilities in websites. This tool is the first of its kind. Instead of just checking one page as most of the tools do, this tool traverses...
View ArticleLalin - Hackpack & Kali Linux Tools
Lalin is a remake of Lazykali by bradfreda with fixed bugs , added new features and uptodate tools . It's compatible with the latest release of Kali (Rolling)Changelog Lalin gets updated weekly with...
View ArticleRITM - Ruby In The Middle (HTTP/HTTPS Interception Proxy)
Ruby in the middle (RITM) is an HTTP/HTTPS interception proxy with on-the-fly certificate generation and signing, which leaves the user with the full power of the Ruby language to intercept and even...
View ArticleBrowserBackdoor - Secure JavaScript WebSocket Backdoor and a Ruby...
BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.BrowserBackdoorServer is a WebSocket server that listens for incoming WebSocket...
View ArticleShadowd - Collection Of Tools To Detect, Record And Prevent Attacks On Web...
Shadow Daemon is a collection of tools to detect , record and prevent attacks on web application. Technically speaking, Shadow Daemon is a web application firewall that intercepts requests and filters...
View Article