SPARTA - Network Infrastructure Penetration Testing Tool
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time...
View Articlecrackle - Crack Bluetooth Smart (BLE) Encryption
crackle cracks BLE Encryption (AKA Bluetooth Smart). crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK...
View ArticleWIFI Client Detection - Identify People By Assigning A Name To A Device...
WIFI Client Detection - Identify people by assigning a name to a device performing a wireless probe request. Download WIFI Client Detection
View ArticleHashview - A Web Front-End For Password Cracking And Analytics
Hashview is a tool for security professionals to help organize and automate the repetitious tasks related to password cracking. Hashview is a web application that manages hashcat ( https://hashcat.net...
View ArticleOverThruster - HID Attack Payload Generator For Arduinos
OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip, like the CJMCU-BEETLE, or the new LilyGo "BadUSB" devices...
View ArticleRogueSploit - Powerfull social engeering Wi-Fi trap!
RogueSploit is an open source automated script made to create a Fake Acces Point, with dhcpd server, dns spoofing, host redirection, browser_autopwn1 or autopwn2 or beef+mitmf.TO DO LIST: Add...
View Articlekimi - Script To Generate Malicious Debian Packages (Debian Trojans)
Script to generate malicious debian packages (debain trojans). Kimi is name inspired from "Kimimaro" one of my favriote charater from anime called "Naruto".Kimi is a script which generates Malicious...
View Articleansvif - An Advanced Fuzzing Framework Designed To Find Vulnerabilities In...
ansvif, written primarily in C++, is designed to find code bugs by throwing garbage input at programs to see how they react. This is great for finding bugs, because not every type of input is always...
View Articleshootback - a reverse TCP tunnel let you access target behind NAT or firewall
shootback is a reverse TCP tunnel let you access target behind NAT or firewallConsumes less than 1% CPU and 8MB memory under 800 concurrency. slaver is single file and only depends on python(2.7/3.4+)...
View ArticleLynis 2.4.4 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleStitch - Python Remote Administration Tool (RAT)
This is a cross platform python framework which allows you to build custom payloads for Windows, Mac OSX and Linux as well. You are able to select whether the payload binds to a specific IP and port,...
View ArticleBlackArch Linux 2017.03.01 - Penetration Testing Distribution
BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 1707tools. You can install tools individually or in groups. BlackArch Linux...
View ArticleUmbrella - A Phishing Dropper designed to Pentest
Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed. To compromise the same target again, you need...
View ArticleIntelMQ - A solution for IT security teams for collecting and processing...
IntelMQ is a solution for IT security teams (CERTs, CSIRTs, abuse departments,...) for collecting and processing security feeds (such as log files) using a message queuing protocol. It's a community...
View Articlefiltron - Filtering reverse HTTP proxy
Reverse HTTP proxy to filter requests by different rules. Can be used between production webserver and the application server to prevent abuse of the application backend. The original purpose of this...
View ArticlecgPwn - Cyber Grand Pwnage Box
A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks. This is a Ubuntu VM tailored for hardware hacking, RE and Wargaming. Tools included Pwndbg Pwntools...
View Articleinfoga - Gathering Email Information Tool
Gathering email information tool with Google, Bing, and Shodan. Download infoga
View ArticleBruteXSS - Tool to find XSS vulnerabilities in web application
BruteXSS is a tool written in python simply to find XSS vulnerabilities in web application.This tool was originally developed by Shawar Khan in CLI. I just redesigned it and made it GUI for more...
View Articlestruts-pwn - An exploit for Apache Struts CVE-2017-5638
An exploit for Apache Struts CVE-2017-5638 Usage Testing a single URL. python struts-pwn.py --url 'http://example.com/struts2-showcase/index.action' -c 'id' Testing a list of URLs. python...
View Articlestrutszeiro - Telegram Bot to manage botnets created with struts...
Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638) Dependencies pip install -r requeriments.txt Config Create a telegram bot, save the API token in config/token.confCreate...
View Article