Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

rePy2exe - A Reverse Engineering Tool for py2exe applications

Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.pyor python2.7 rePy2exe.py Authors...

View Article


Image may be NSFW.
Clik here to view.

Invoke-TheHash - PowerShell Pass The Hash Utils

Invoke-TheHash contains PowerShell functions for performing NTLMv2 pass the hash WMI and SMB command execution. WMI and SMB services are accessed through .NET TCPClient connections. Local administrator...

View Article


Image may be NSFW.
Clik here to view.

Tinfoleak v2.0 - Get detailed information about a Twitter user activity

Are you interested in OSINT tools? Tinfoleak is the best OSINT tool for Twitter, and is open-source!The new version includes a lot of new and improved features:Search by coordinatesGeolocated...

View Article

Image may be NSFW.
Clik here to view.

JudasDNS - Nameserver DNS poisoning attacks made easy

A DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation. Judas works by proxying all DNS queries to the legitimate nameservers for a domain. The...

View Article

Image may be NSFW.
Clik here to view.

Glue - Application Security Automation

Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Recommended Usage For those wishing to run Glue, we...

View Article


Image may be NSFW.
Clik here to view.

LUNAR - Lockdown UNix Auditing and Reporting

A UNIX security auditing tool based on several security frameworks Introduction This scripts generates a scored audit report of a Unix host's security. It is based on the CIS and other frameworks....

View Article

Image may be NSFW.
Clik here to view.

chisel - A fast TCP tunnel over HTTP

Chisel is a fast TCP tunnel, transported over HTTP. Single executable including both client and server. Written in Go (Golang). Chisel is mainly useful for passing through firewalls, though it can also...

View Article

Image may be NSFW.
Clik here to view.

Automato - Automating the user-focused enumeration tasks during an internal...

automato should help with automating some of the user-focused enumeration tasks during an internal penetration test. automato is also capable of conducting limited brute force attacks such as: Testing...

View Article


Image may be NSFW.
Clik here to view.

iptodomain - This tool extract domains from IP address based in the...

This tool allows you to extract domains from a IP range, using the historic information archived in Virustotal(using API key). It is usefull if you want to know what domains are behind of this IP...

View Article


Image may be NSFW.
Clik here to view.

backdoorppt - transform your payload.exe into one fake word doc (.ppt)

backdoorppt - 'Office spoof extensions tool'Version release: v1.5-StableDistros Supported: Linux Kali, Ubuntu, MintAuthor: pedro ubuntu [ r00t-3xp10it ]Suspicious-Shell-Activity© (SSA) RedTeam develop...

View Article

Image may be NSFW.
Clik here to view.

passfault - OWASP Passfault evaluates passwords and enforces password policy...

Objective: Do Passwords Better! Running the Command-line Interface: install java cd core gradlew installDist run build/install/core/bin/core Running the jsonWebService: cd jsonService gradlew build...

View Article

Image may be NSFW.
Clik here to view.

reversemap - Analyse SQL injection attempts in web server logs

Analyse SQL injection attempts in web server logs The program can either be run in batch mode or interactive mode. In batch mode the program will accept Apache web server logs and will deobfuscate...

View Article

Image may be NSFW.
Clik here to view.

FiercePhish - A Full-Fledged Phishing Framework To Manage All Phishing...

FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will...

View Article


Image may be NSFW.
Clik here to view.

OWASP Security Shepherd - Web And Mobile Application Security Training Platform

The OWASP Security Shepherd Project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set...

View Article

Image may be NSFW.
Clik here to view.

Nozes - PeTest CMD Manager [Automate Your PenTest Attacks In One Click]

Nozes is a Pentest cmd manager. You can automate your pentest attacks in one click and get results... Read the docs:...

View Article


Image may be NSFW.
Clik here to view.

Cyber Probe - Capturing, Analysing and Responding to Cyber Attacks

Cyberprobe is a distributed software architecture for monitoring of networks against attack. It consists of two components: cyberprobe, which collects data packets and forwards them over a network in...

View Article

Image may be NSFW.
Clik here to view.

OWASP Security Knowledge Framework - An expert system application that uses...

Security Knowledge Framework is an expert system application that uses OWASP Application Security Verification Standard, code examples, helps developers in pre-development and post-development....

View Article


Image may be NSFW.
Clik here to view.

Faraday v2.3 - Collaborative Penetration Test and Vulnerability Management...

Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...

View Article

Image may be NSFW.
Clik here to view.

Linux Kodachi3 - Secure Open Source Linux Distribution

Linux Kodachi operating system is based on Debian 8.6 it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about...

View Article

Image may be NSFW.
Clik here to view.

Insanity-Framework - Generate Payloads and control Remote Machines

With the dynamics of persuasion that prove effective in a pentest, several painstaking means of making a payload has emerged, Insanity Framework provides speed and effectiveness in a single tool to...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>