rePy2exe - A Reverse Engineering Tool for py2exe applications
Reverse Engineering Tool for py2exe applications. Prerequisites cmake git python2.7 Cloning git clone https://github.com/4w4k3/rePy2exe.git Running python rePy2exe.pyor python2.7 rePy2exe.py Authors...
View ArticleInvoke-TheHash - PowerShell Pass The Hash Utils
Invoke-TheHash contains PowerShell functions for performing NTLMv2 pass the hash WMI and SMB command execution. WMI and SMB services are accessed through .NET TCPClient connections. Local administrator...
View ArticleTinfoleak v2.0 - Get detailed information about a Twitter user activity
Are you interested in OSINT tools? Tinfoleak is the best OSINT tool for Twitter, and is open-source!The new version includes a lot of new and improved features:Search by coordinatesGeolocated...
View ArticleJudasDNS - Nameserver DNS poisoning attacks made easy
A DNS proxy server built to be deployed in place of a taken over nameserver to perform targeted exploitation. Judas works by proxying all DNS queries to the legitimate nameservers for a domain. The...
View ArticleGlue - Application Security Automation
Glue is a framework for running a series of tools. Generally, it is intended as a backbone for automating a security analysis pipeline of tools. Recommended Usage For those wishing to run Glue, we...
View ArticleLUNAR - Lockdown UNix Auditing and Reporting
A UNIX security auditing tool based on several security frameworks Introduction This scripts generates a scored audit report of a Unix host's security. It is based on the CIS and other frameworks....
View Articlechisel - A fast TCP tunnel over HTTP
Chisel is a fast TCP tunnel, transported over HTTP. Single executable including both client and server. Written in Go (Golang). Chisel is mainly useful for passing through firewalls, though it can also...
View ArticleAutomato - Automating the user-focused enumeration tasks during an internal...
automato should help with automating some of the user-focused enumeration tasks during an internal penetration test. automato is also capable of conducting limited brute force attacks such as: Testing...
View Articleiptodomain - This tool extract domains from IP address based in the...
This tool allows you to extract domains from a IP range, using the historic information archived in Virustotal(using API key). It is usefull if you want to know what domains are behind of this IP...
View Articlebackdoorppt - transform your payload.exe into one fake word doc (.ppt)
backdoorppt - 'Office spoof extensions tool'Version release: v1.5-StableDistros Supported: Linux Kali, Ubuntu, MintAuthor: pedro ubuntu [ r00t-3xp10it ]Suspicious-Shell-Activity© (SSA) RedTeam develop...
View Articlepassfault - OWASP Passfault evaluates passwords and enforces password policy...
Objective: Do Passwords Better! Running the Command-line Interface: install java cd core gradlew installDist run build/install/core/bin/core Running the jsonWebService: cd jsonService gradlew build...
View Articlereversemap - Analyse SQL injection attempts in web server logs
Analyse SQL injection attempts in web server logs The program can either be run in batch mode or interactive mode. In batch mode the program will accept Apache web server logs and will deobfuscate...
View ArticleFiercePhish - A Full-Fledged Phishing Framework To Manage All Phishing...
FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will...
View ArticleOWASP Security Shepherd - Web And Mobile Application Security Training Platform
The OWASP Security Shepherd Project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set...
View ArticleNozes - PeTest CMD Manager [Automate Your PenTest Attacks In One Click]
Nozes is a Pentest cmd manager. You can automate your pentest attacks in one click and get results... Read the docs:...
View ArticleCyber Probe - Capturing, Analysing and Responding to Cyber Attacks
Cyberprobe is a distributed software architecture for monitoring of networks against attack. It consists of two components: cyberprobe, which collects data packets and forwards them over a network in...
View ArticleOWASP Security Knowledge Framework - An expert system application that uses...
Security Knowledge Framework is an expert system application that uses OWASP Application Security Verification Standard, code examples, helps developers in pre-development and post-development....
View ArticleFaraday v2.3 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleLinux Kodachi3 - Secure Open Source Linux Distribution
Linux Kodachi operating system is based on Debian 8.6 it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about...
View ArticleInsanity-Framework - Generate Payloads and control Remote Machines
With the dynamics of persuasion that prove effective in a pentest, several painstaking means of making a payload has emerged, Insanity Framework provides speed and effectiveness in a single tool to...
View Article