myLG - Network Diagnostic Tool
myLG is an open source software utility which combines the functions of the different network probes in one network diagnostic tool. Features Popular looking glasses (ping/trace/bgp): Telia, Level3...
View Articlecreak - Poison, Reset, Spoof, Redirect MITM Script
Performs some of the most famous MITM attack on target addresses located in a local network. Among these, deny navigation and download capabilities of a target host in the local network performing an...
View ArticleWinMACSpoofer - Windows Tool For Spoofing The Mac Address
Windows application for spoofing the MAC address and host name. Usage The program must be run in "administrator mode" for the functions to work properly Set a new Random MAC address Press the randomize...
View ArticleAcunetix v11 - Web Application Security Testing Tool
London, UK – November 2016 – Acunetix, the pioneer in automated web application security software, has announced the release of version 11. New integrated vulnerability management features extend the...
View Articleslowloris - Low bandwidth DoS tool
Slowloris is basically an HTTP Denial of Service attack that affects threaded servers. It works like this: We start making lots of HTTP requests. We send headers periodically (every ~15 seconds) to...
View Articlebrut3k1t - Server-side Brute-force Module (ssh, ftp, smtp, facebook, and more)
Server-side brute-force module. Brute-force (dictionary attack, jk) attack that supports multiple protocols and services. 1. Introduction brut3k1t is a server-side bruteforce module that supports...
View Articledeep-pwning - Metasploit for Machine Learning
Deep-pwning is a lightweight framework for experimenting with machine learning models with the goal of evaluating their robustness against a motivated adversary. Note that deep-pwning in its current...
View Articlehttpstat - Curl Statistics Made Simple
httpstat visualizes curl(1) statistics in a way of beauty and clarity. It is a single file Python script that has no dependency and is compatible with Python 3. Installation There are three ways to get...
View ArticleBrutal - Toolkit to quickly create various Payload, PowerShell Attack, Virus...
Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you insert the device, it will be detected as a keyboard,...
View ArticleMetasploitable3 - An Intentionally Vulnerable Machine for Exploit Testing
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with metasploit . Metasploitable3 is...
View ArticleF-Scrack - A Single File Bruteforcer Supports Multi-Protocol
F-Scrack is a single file bruteforcer supports multi-protocol, no extra library requires except python standard library, which is ideal for a quick test. Currently support protocol: FTP, MySQL,...
View ArticleFaraday v2.2 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleVproxy - Forward HTTP/S Traffic To Proxy Instance
If you are familiar with mobile penetration testing and you did one before, you probably came across this kind of situation when you want to intercept the application HTTP or HTTPS traffic using your...
View ArticleNEET - Network Enumeration and Exploitation Tool
Neet is a flexible, multi-threaded tool for network penetration testing. It runs on Linux and co-ordinates the use of numerous other open-source network tools, with the aim of gathering as much network...
View ArticleFireaway - Next Generation Firewall Audit and Bypass Tool
Fireaway is a tool for auditing, bypassing, and exfiltrating data against layer 7/AppID inspection rules on next generation firewalls. These tactics are based on the principle of having to allow...
View ArticleXSSER - From XSS to RCE
From XSS to RCE 2.5 - Black Hat Europe Arsenal 2016 Demo Version 2.0 - 2015: https://www.youtube.com/playlist?list=PLIjb28IYMQgqqqApoGRCZ_O40vP-eKsgf Version 2.5 - 2016:...
View ArticleDripcap - Caffeinated Packet Analyzer
Caffeinated packet analyzer. Dripcap is a modern packet analyzer based on Electron.Getting StartedDownload & InstallCapturingPacket FilteringDisplay Filter SyntaxAdvanced UsageBuild from...
View Articleidb - iOS App Security Assessment Tool
idb is a tool to simplify some common tasks for iOS app security assessments and research. Please see the Documentation for a more detailed summary of each function.FeaturesAssessment Setup SSH port...
View ArticleShellcodeCompiler - Shellcode C/C++ Compiler for Windows
Shellcode Compiler is a program that compiles C/C++ style code into a small, position-independent and NULL-free shellcode for Windows. It is possible to call any Windows API function in a user-friendly...
View ArticleDPAT - Domain Password Audit Tool for Pentesters
This is a python script that will generate password use statistics from password hashes dumped from a domain controller and a password crack file such as oclHashcat.pot generated from the oclHashcat...
View Article