sudo-snooper - Python script to fool sudo users
sudo-snooper acts like the original sudo binary to fool users into entering their passwords. It will show a fake prompt just like the original to the user to enter their sudo password. This can be...
View Articleanonym8 - Transparent Proxy through TOR, I2P, Privoxy, Polipo and modify DNS
Transparent Proxy through TOR, I2P, Privoxy, Polipo and modify DNS, for a simple and better privacy and security; Include Anonymizing Relay Monitor (arm), macchanger, hostname and wipe (Cleans...
View Articletinyshell - Python Client with PHP Shell
python Client with php shell , allows to connect and send commands over current protocol using POST and GET RequestsFeatures connect with direct session with no need for reverse connection . support...
View Article4nonimizer - A bash script for anonymizing the public IP managing the...
What is 4nonimizer?It is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN), whether free or paid....
View ArticlePowerLurk - Malicious WMI Events using PowerShell
PowerLurk is a PowerShell toolset for building malicious WMI Event Subsriptions. The goal is to make WMI events easier to fire off during a penetration test or red team engagement. Please see my post...
View ArticleKNXmap - KNXnet/IP scanning and auditing tool for KNX home automation...
A tool for scanning and auditing KNXnet/IP gateways on IP driven networks. KNXnet/IP defines Ethernet as physical communication media for KNX (EN 50090, ISO/IEC 14543). KNXmap also allows to scan for...
View ArticleDracnmap - Exploit Network and Gathering Information with Nmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and...
View ArticleSpade - Android APK Backdoor Embedder
Quick and handy APK backdoor embedder with metasploit android payloads. Requirements metasploit Installation and execution Then you can download smap by cloning the Git repository: git clone...
View Articlearch-audit - An utility like pkg-audit for Arch Linux
An utility like pkg-audit for Arch Linux. Based on Arch CVE Monitoring Team dataUses data collected by the awesome Arch CVE Monitoring Team . Installation From AUR The PKGBUILD is available on AUR ....
View Articleyawast - The YAWAST Antecedent Web Application Security Toolkit
YAWAST is an application meant to simplify initial analysis and information gathering for penetration testers and security auditors. It performs basic checks in these categories: TLS/SSL - Versions and...
View ArticleDracOS - Lightweight and Powerful Penetration Testing OS
Dracos Linux ( www.dracos-linux.org ) is the Linux operating system from Indonesian , open source is built based on the Linux From Scratch under the protection of the GNU General Public License v3.0....
View ArticleVBScan 0.1.7 - Black Box vBulletin Vulnerability Scanner
OWASP VBScan (short for [VB]ulletin Vulnerability [Scan]ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them . Why OWASP VBScan ? If you...
View ArticleRuler - A Tool To Abuse Exchange Services
Ruler is a tool that allows you to interact with Exchange servers through the MAPI/HTTP protocol. The main aim is abuse the client-side Outlook mail rules as described in: Silentbreak blog Silentbreak...
View ArticleWP Security Audit Log - The Ultimate WordPress Audit Trail Plugin
The WP Security Audit Log plugin is a WordPress plugin that keeps an audit trail of everything that happens on your WordPress and WordPress multisite network. There are several WordPress audit trail /...
View ArticleKing Phisher 1.5.2 - Phishing Campaign Toolkit
King Phisher is a tool for testing and promoting user awareness by simulating real world phishing attacks. It features an easy to use, yet very flexible architecture allowing full control over both...
View Articleir-rescue - A Windows Batch Script To Comprehensively Collect Host Forensic Data
ir-rescue is a lightweight Windows Batch script that collects a myriad of forensic data from 32-bit and 64-bit Windows systems while respecting the order of volatility and artifacts that are changed...
View ArticleBBQSQL - A Blind SQL Injection Exploitation Tool
Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don't you have to write something custom. This is time-consuming and tedious. BBQSQL can help...
View ArticleAuto_EAP - Automated Brute-Force Login Attacks Against EAP Networks
Auto_EAP.py is a script designed to perform automated brute-force authentication attacks against various types of EAP networks. These types of wireless networks provide an interface to facilitate...
View Articlessh-audit - SSH Server Auditing
ssh-audit is a tool for ssh server auditing. Features SSH1 and SSH2 protocol server support; grab banner, recognize device or software and operating system, detect compression; gather key-exchange,...
View ArticleAutoBrowser 4.0 - AutoBrowser Screenshot of HTTP/s Based Ports
AutoBrowser is a tool written in python for penetration testers. The purpose of this tool is to create report(Json file) and screenshots of http/s based ports on the network. you can choose between...
View Article