THC-Hydra 8.2 - Network Logon Cracker
A very fast network logon cracker which support many different services.See feature sets and services coverage page - incl. a speed comparison against ncrack and medusa.Number one of the biggest...
View ArticlePythem - Python Network/Pentesting Tool
PytheM is a python network/pentesting tool. Same has been developed in the hope that it will be useful and i don't take responsabillity of any misapplication of it. Only for GNU/Linux OS. Installation...
View Articlelisa.py - An Exploit Dev Swiss Army Knife
lisa.py An Exploit Dev Swiss Army Knife. Installation Copy lisa.py and .lldbinit to ~/ Use the following commands: ant4g0nist$ cp lisa.py ~/lisa.pyant4g0nist$ cp lldbinit ~/.lldbinitant4g0nist$ lldb...
View ArticleScansploit - Tool for Injecting Malicious Payloads Into Barcodes (code128,...
Tool for Injecting Malicious Payloads Into Barcodes Barcodes (code128) QRCodes DataMatrix EAN13 Requirements Python3 PyStrich pip3 install pystrich Incase of jpeg error: sudo apt-get install...
View ArticleSimpleEmailSpoofer - A simple Python CLI to Spoof Emails (SPF/DMARC checking)
A few Python programs designed to help penetration testers with email spoofing. SimpleEmailSpoofer.py A program that spoofs emails. Currently in development spoofcheck.py A program that checks if a...
View ArticleFaraday v1.0.21 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleSuricata 3.1 - Open Source IDS / IPS / NSM engine
Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine. Open Source and owned by a community run non-profit foundation, the Open Information Security Foundation (OISF)....
View ArticleWhonix 13 - Anonymous Operating System
Whonix is a desktop operating system designed for advanced security and privacy. It realistically addresses attacks while maintaining usability. It makes online anonymity possible via fail-safe,...
View ArticleKatastrophe - Command Line Tool to download torrents from Kickass Torrents
A Command-Line Interface for scraping Kickass torrents (kat.cr). Provides options to scrape top torrents in given categories, or searching for specific torrents. The user can select single, multiple or...
View Articlepytbull - Intrusion Detection/Prevention System (IDS/IPS) Testing Framework
pytbull is an Intrusion Detection/Prevention System (IDS/IPS) Testing Framework for Snort, Suricata and any IDS/IPS that generates an alert file. It can be used to test the detection and blocking...
View ArticlePulsar - Protocol Learning, Simulation and Stateful Fuzzer
Protocol Learning, Simulation and Stateful Fuzzer Pulsar is a network fuzzer with automatic protocol learning and simulation capabilites. The tool allows to model a protocol through machine learning...
View ArticleWaybackpack - Download the entire Wayback Machine archive for a given URL
Waybackpack is a command-line tool that lets you download the entire Wayback Machine archive for a given URL.For instance, to download every copy of the Department of Labor's homepage through 1996...
View ArticlePeach Fuzz - Vulnerability Scanning Framework
This tool aims to look through files in a given directory to detect any unsafe, vulnerable, or dangerous function calls. It is designed to be extensible and easy to understand; you can "plug-and-play"...
View ArticleNetBox - IP Address Management (IPAM) and Data Center Infrastructure...
NetBox is an IP address management (IPAM) and data center infrastructure management (DCIM) tool. Initially conceived by the network engineering team at DigitalOcean , NetBox was developed specifically...
View ArticleFierce - A DNS Reconnaissance Tool for Locating Non-Contiguous IP Space
First, credit where credit is due, fierce was originally written by RSnake along with others at http://ha.ckers.org/ . This is simply a conversion to Python 3 to simplify and modernize the codebase....
View ArticleAndroguard - Reverse engineering, Malware and goodware analysis of Android...
Reverse engineering, Malware and goodware analysis of Android applications ... and more (ninja !) Features Androguard is a full python tool to play with Android files. Map and manipulate...
View ArticleMimikittenz - Post-Exploitation Powershell Tool for Extracting Juicy info...
mimikittenz is a post-exploitation powershell tool that utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes. mimikittenz can also...
View ArticleAntiRansom - Fighting against Ransomware using Honeypots
AntiRansom is a tool capable of detect and stop attacks of Ransomware using honeypots.First, Anti Ransom creates a random decoy folder with many useless random documents (Excel, PDF) and then it...
View ArticleMARA Framework - Mobile Application Reverse engineering and Analysis Framework
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering tools, in order to make the task or...
View ArticleT50 - The Fastest Packet Injector
T50 (f.k.a. F22 Raptor) is a tool designed to perform "Stress Testing". The concept started on 2001, right after release 'nb-isakmp.c', and the main goal was: Having a tool to perform TCP/IP protocol...
View Article