Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

SPARTA - Network Infrastructure Penetration Testing Tool

SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time...

View Article


Image may be NSFW.
Clik here to view.

crackle - Crack Bluetooth Smart (BLE) Encryption

crackle cracks BLE Encryption (AKA Bluetooth Smart). crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK...

View Article


Image may be NSFW.
Clik here to view.

WIFI Client Detection - Identify People By Assigning A Name To A Device...

WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request. Download WIFI Client Detection

View Article

Image may be NSFW.
Clik here to view.

Hashview - A Web Front-End For Password Cracking And Analytics

Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat ( https://hashcat.net...

View Article

Image may be NSFW.
Clik here to view.

OverThruster - HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip, like the CJMCU-BEETLE, or the new LilyGo "BadUSB" devices...

View Article


Image may be NSFW.
Clik here to view.

RogueSploit - Powerfull social engeering Wi-Fi trap!

RogueSploit is an open source automated script made to create a Fake Acces Point, with dhcpd server, dns spoofing, host redirection, browser_autopwn1 or autopwn2 or beef+mitmf.TO DO LIST: Add...

View Article

Image may be NSFW.
Clik here to view.

kimi - Script To Generate Malicious Debian Packages (Debian Trojans)

Script to generate malicious debian packages (debain trojans). Kimi is name inspired from "Kimimaro" one of my favriote charater from anime called "Naruto".Kimi is a script which generates Malicious...

View Article

Image may be NSFW.
Clik here to view.

ansvif - An Advanced Fuzzing Framework Designed To Find Vulnerabilities In...

ansvif, written primarily in C++, is designed to find code bugs by throwing garbage input at programs to see how they react. This is great for finding bugs, because not every type of input is always...

View Article


Image may be NSFW.
Clik here to view.

shootback - a reverse TCP tunnel let you access target behind NAT or firewall

shootback is a reverse TCP tunnel let you access target behind NAT or firewallConsumes less than 1% CPU and 8MB memory under 800 concurrency. slaver is single file and only depends on python(2.7/3.4+)...

View Article


Image may be NSFW.
Clik here to view.

Lynis 2.4.4 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article

Image may be NSFW.
Clik here to view.

Stitch - Python Remote Administration Tool (RAT)

This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port,...

View Article

Image may be NSFW.
Clik here to view.

BlackArch Linux 2017.03.01 - Penetration Testing Distribution

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1707tools. You can install tools individually or in groups. BlackArch Linux...

View Article

Image may be NSFW.
Clik here to view.

Umbrella - A Phishing Dropper designed to Pentest

Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed. To compromise the same target again, you need...

View Article


Image may be NSFW.
Clik here to view.

IntelMQ - A solution for IT security teams for collecting and processing...

IntelMQ is a solution for IT security teams (CERTs, CSIRTs, abuse departments,...) for collecting and processing security feeds (such as log files) using a message queuing protocol. It's a community...

View Article

Image may be NSFW.
Clik here to view.

filtron - Filtering reverse HTTP proxy

Reverse HTTP proxy to filter requests by different rules. Can be used between production webserver and the application server to prevent abuse of the application backend. The original purpose of this...

View Article


Image may be NSFW.
Clik here to view.

cgPwn - Cyber Grand Pwnage Box

A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks. This is a Ubuntu VM tailored for hardware hacking, RE and Wargaming. Tools included Pwndbg Pwntools...

View Article

Image may be NSFW.
Clik here to view.

infoga - Gathering Email Information Tool

Gathering email information tool with Google, Bing, and Shodan. Download infoga

View Article


Image may be NSFW.
Clik here to view.

BruteXSS - Tool to find XSS vulnerabilities in web application

BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application.This tool was originally developed by Shawar Khan in CLI. I just redesigned it and made it GUI for more...

View Article

Image may be NSFW.
Clik here to view.

struts-pwn - An exploit for Apache Struts CVE-2017-5638

An exploit for Apache Struts CVE-2017-5638 Usage Testing a single URL. python struts-pwn.py --url 'http://example.com/struts2-showcase/index.action' -c 'id' Testing a list of URLs. python...

View Article

Image may be NSFW.
Clik here to view.

strutszeiro - Telegram Bot to manage botnets created with struts...

Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) Dependencies pip install -r requeriments.txt Config Create a telegram bot, save the API token in config/token.confCreate...

View Article
Browsing all 5816 articles
Browse latest View live