Wildpwn - Unix Wildcard Attack Tool
Wildpwn is a Python UNIX wildcard attack tool that helps you generate attacks, based on a paper by Leon Juranic. It’s considered a fairly old-skool attack vector, but it still works quite often. First...
View ArticleLynis 2.3.0 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View Articleshard - A Command Line Tool To Detect Shared Passwords
A command line tool to detect shared passwords Usage List options: $ java -jar shard-1.2.jar --helpShard 1.2Usage: java -jar shard-1.2.jar [options] -u, --username <value> Username to test -p,...
View ArticleWhoDat - Pivotable Reverse WhoIs / PDNS Fusion with Registrant Tracking &...
The WhoDat project is a front-end for whoisxmlapi data, or any whois data living in a MongoDB. It integrates whois data, current IP resolutions and passive DNS. In addition to providing an interactive,...
View ArticletomcatWarDeployer - Apache Tomcat auto WAR Deployment & Pwning Penetration...
tomcatWarDeployerApache Tomcat auto WAR deployment & pwning penetration testing tool. What is it? This is a penetration testing tool intended to leverage Apache Tomcat credentials in order to...
View Articleshadow - Firefox/Jemalloc Heap Exploitation Swiss Army Knife
A new, extended (and renamed ;) version of the Firefox/jemalloc heap exploitation swiss army knife. shadow has been tested with the following: Windows 8.1 x86-64 Windows 7 SP1 x86 and x86-64 WinDBG...
View ArticlenightHawkResponse - Incident Response Forensic Framework
Custom built application for asynchronus forensic data presentation on an Elasticsearch backend. This application is designed to ingest a Mandiant Redline "collections" file and give flexibility in...
View ArticleTLS-Attacker - A Java-based Framework for Analyzing TLS Libraries
TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is able to send arbitrary protocol messages in an arbitrary order to the TLS peer, and define their modifications using a provided...
View ArticleOWASP Mth3l3m3nt Framework - Penetration Testing Aiding Tool And Exploitation...
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web using the web as well as pentest on the go through its responsive...
View ArticleRekall - Rekall Memory Forensic Framework
The Rekall Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples....
View ArticleParrot OS 3.1 (Defcon) - Friendly OS designed for Pentesting, Computer...
Parrot Security OS is a cloud friendly operating system designed for Pentesting, Computer Forensic, Reverse engineering, Hacking, Cloud pentesting, privacy/anonimity and cryptography. Based on Debian...
View ArticleLimon - Sandbox for Analyzing Linux Malwares
Limon is a sandbox developed as a research project written in python, which automatically collects, analyzes, and reports on the run time indicators of Linux malware. It allows one to inspect the Linux...
View ArticleLionSec Linux 5.0 - Penetration Testing Operating system based on Ubuntu
LionSec Linux 5.0 is a Ubuntu based penetration testing distribution . It was built in order to perform Computer Forensics , Penetration Tests , Wireless Analysis . With the "Anonymous Mode" , you can...
View ArticleTheFatRat - Easy Tool For Generate Backdoor with Msfvenom
Easy tool for generate backdoor with msfvenom ( part of metasploit framework ) and program compiles a C program with a meterpreter reverse_tcp payload In it that can then be executed on a windows host...
View ArticleXerosploit - Efficient And Advanced Man In The Middle Framework
Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows...
View ArticleHellRaiser - Vulnerability Scanner
Install Install ruby, bundler and rails. https://gorails.com/setup/ubuntu/16.04 Install redis-server and nmap. sudo apt-get updatesudo apt-get install redis-server nmapClone HellRaiser repository,...
View Articlepi-hole - A Black Hole For Internet Advertisements (Designed For Raspberry Pi)
A black hole for Internet advertisements (designed for Raspberry Pi) Designed For Raspberry Pi A+, B, B+, 2, Zero, and 3B (with an Ethernet/Wi-Fi adapter) (Works on most Debian distributions!) Install...
View ArticlePocsuite - Remote Vulnerability Testing Framework Developed By The Knownsec...
Pocsuite is an open-sourced remote vulnerability testing and PoC development framework developed by the Knownsec Security Team. It serves as the cornerstone of the team.You can use Pocsuite to verify...
View Articletplmap - Automatic Server-Side Template Injection Detection and Exploitation...
Tplmap (short for Template Mapper ) is a tool that automate the process of detecting and exploiting Server-Side Template Injection vulnerabilities (SSTI). This can be used by developers, penetration...
View ArticlepDNS2 - Passive DNS V2
pDNS2 is yet another implementation of a passive DNS tool working with Redis as the database. pDNS2 means ‘passive DNS version2’ and favors speed in query over other database features. pDNS2 is based...
View Article