l0l - The Exploit Development Kit
l0l a exploit development kit. with C++ language scripting. Yet, are being developed. Then the beta version will be published. Status Shellcodes : 5 Injectors : 0 Encoders : 0 Backdoors : 6 Install -...
View ArticleLHF (Low Hanging Fruit) - A Modular Recon Tool For Pentesting
To install dependencies: ./Install.sh To start: ./LHF.py[+] Checking permissions[-] Rockyou wordlist is missing trying to decompress...[+] Rockyou wordlist is decompressed![-] Please enter the ip to...
View ArticleHatDBG - Minimal WIN32 Debugger in Powershell
The HatDBG is A pure Powershell win32 debugging abstraction class. The goal of this project is to make a powershell debugger. It is intended to be used during internal penetration tests and red team...
View ArticleWiFi-Pumpkin v0.8.1 - Framework for Rogue Wi-Fi Access Point Attack
Framework for Rogue Wi-Fi Access Point Attack Description WiFi-Pumpkin is a open source security tool that provides the Rogue access point to Man-In-The-Middle and network attacks. Installation Kali...
View Articlelibenom - Make Fast and Easy Payloads with MSFvenom
Libenom is a tool created for make more easy and fast the creation of payloads with MSFvenom and get all the data generated ordered.RequirementsA linux distribution for pentesting or Ubuntu, Debian,...
View Articlesshhipot - High-Interaction MitM SSH Honeypot
High-interaction SSH honeypot (ok, it's really a logging ssh proxy). Still more or less a work-in-progress. Feel free to go install this repository if you'd like to try it. Run it with -h to see more...
View ArticleDyMerge - Dynamic Dictionary Merger
A simple, yet powerful tool - written purely in python - which takes given wordlists and merges them into one dynamic dictionary that can then be used as ammunition for a successful dictionary based...
View ArticleARTLAS - Apache Real Time Logs Analyzer System
Real time Apache log analyzer, based on top 10 OWASP vulnerabilities, identifies attempts of exploration in your web application, and notify you or your incident team on Telegram, Zabbix and...
View ArticleLazyMap - Automate NMAP Scans and Generate Custom Nessus Policies Automatically
Automate NMAP scans and custom Nessus polices. Installing git clone https://github.com/commonexploits/port-scan-automation.git How To Use ./lazymap.sh Features Discovers live devices Auto launches port...
View ArticleKali Linux 2016.2 - The Best Penetration Testing Distribution
This release brings a whole bunch of interesting news and updates into the world of Kali.New KDE, MATE, LXDE, e17, and Xfce BuildsAlthough users are able to build and customize their Kali Linux ISOs...
View ArticleSSMA - Simple Static Malware Analyzer
SSMA is a simple malware analyzer written in Python 3. Features: Searches for websites, e-mail addresses, IP addresses in the strings of the file. Looks for Windows functions commonly used by malware....
View Articlewinfsp - Windows File System Proxy
WinFsp is a set of software components for Windows computers that allows the creation of user mode file systems. In this sense it is similar to FUSE (Filesystem in Userspace), which provides the same...
View Articledhcpoptinj - DHCP Option Injector
Have you ever wanted to intercept DHCP requests and squeeze in a few extra DHCP options, unbeknownst to the sender? Probably not. However, should the need ever come, dhcpoptinj will (hopefully) help...
View ArticleDMitry - Deepmagic Information Gathering Tool
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line Application coded in C language. DMitry has the ability to gather as much information as possible about a host. Base...
View ArticleCodeWarrior - Just Another Manual Code Analysis Tool And Static Analysis Tool
Just another manual code analysis tool and static analysis tool Codewarrior runs at HTTPd with TLS, uses KISS principle( https://en.wikipedia.org/wiki/KISS_principle ) Directories: web/ = local of...
View ArticleChoronzon - An Evolutionary Knowledge-Based Fuzzer
An evolutionary knowledge-based fuzzer Introduction This document aims to explain in brief the theory behind Choronzon . Moreover, it provides details about its internals and how one can extend...
View ArticlePassTrust - A Ruby-Based Tool That Converts A Simple Passphrase Into A...
Ruby-based tool which allows you to have secure passwords that you can use anywhere, only by remembering simple passphrases. PassTrust is able to convert any simple string into a secure password...
View Articleswarm - A Modular Distributed Penetration Testing Tool
Swarm is an open source modular distributed penetration testing Tool that use distributed task queue to implement communication in the master-slave mode system and use MongoDB for data storage. It...
View ArticleCloakify - Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social...
Cloakify Toolset - Data Exfiltration In Plain Sight; Evade DLP/MLS Devices; Social Engineering of Analysts; Defeat Data Whitelisting Controls; Evade AV Detection. Text-based steganography usings lists....
View ArticleCartero - Social Engineering Framework
A robust Phishing Framework with a full featured CLI interface. The project was born out necessity through of years of engagements with tools that just didn't do the job. Even though there are many...
View Article