HatCloud - Tool for identify IP real of CloudFlare (Bypass CloudFlare)
HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP. This can be useful if you need test your server and website. Testing your protection against Ddos (Denial of Service) or Dos....
View ArticleBrainDamage - A fully featured backdoor that uses Telegram as a C&C server
A python based backdoor which uses Telegram as C&C server. /\ /_.\ _,.-'/ `",\'-.,_ -~^ /______\`~~-^~: ____ _ _____ | _ \ (_) | __ \ | |_) |_ __ __ _ _ _ __ | | | | __ _ _ __ ___ __ _ __ _ ___ | _...
View ArticleSSLsplit - transparent SSL/TLS interception
SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. It is intended to be useful for network forensics, application security analysis and penetration testing....
View ArticleStruts2Shell - Interactive Shell Command to Exploit Apache Struts CVE-2017-5638
Improves manipulation and sending commands to the vulnerable  Apache Struts server using a shell.Usage:python Struts2Shell.py Download Struts2Shell
View Articlesquidmagic - Analyze a Web-Based Network Traffic to Detect Central Command...
squidmagic is a tool designed to analyze a web-based network traffic to detect central command and control (C&C) servers and Malicious site, using Squid proxy server and Spamhaus. usage squidmagic...
View Articlegdbgui - A browser-based frontend/gui for GDB
A modern, browser-based frontend to gdb (gnu debugger). Add breakpoints, view stack traces, and more in C, C++, Go, and Rust! Simply run gdbgui from the terminal and a new tab will open in your...
View ArticlePloitKit - The Hacker's ToolBox
PloitKit is a Python based GUI tool designed as one-stop for all other softwares. I was facing these kinds of problem, when I need to switch to different system, or I lost my pen-drive. I have to go to...
View ArticleDr0p1t-Framework 1.2 - A Framework That Creates An Advanced FUD Dropper With...
Have you ever heard about trojan droppers ?In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chance to create a dropper that bypass most AVs and have some...
View Articleooniprobe - Measure Internet Censorship & Speed
Interested in collecting evidence of Internet censorship? Curious about the speed and performance of the network that you are using?By running the tests in this app, you will examine the...
View ArticleFaraday v2.4 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleFalconGate - A smart gateway to stop hackers and Malware attacks
A smart gateway to stop hackers, Malware and more... Motivation Cyber attacks are on the raise. Hacker and cyber criminals are continuously improving their methods and building new tools and Malware...
View Articledroopescan - A plugin-based scanner that aids security researchers in...
A plugin-based scanner that aids security researchers in identifying issues with several CMS: Drupal. SilverStripe. Wordpress. Partial functionality for: Joomla (version enumeration and interesting...
View Articlemosh - Mobile Shell replacement for SSH (more robust and responsive,...
Mosh is a remote terminal application that supports intermittent connectivity, allows roaming, and provides speculative local echo and line editing of user keystrokes. It aims to support the typical...
View Articleinquisitor - OSINT Gathering Tool for Companies and Organizations
Inquisitor is a simple for gathering information on companies and organizations through the use of Open Source Intelligence (OSINT) sources. The key features of Inquisitor include: The ability to...
View Articlewuzz - Interactive CLI Tool for HTTP Inspection
Interactive cli tool for HTTP inspection Wuzz command line arguments are similar to cURL's arguments, so it can be used to inspect/modify requests copied from the browser's network inspector with the...
View ArticleDblTekGoIPPwn - Tool to check if an IP of a DblTek GoIP is vulnerable to a...
Tool to exploit challenge response system in vulnerable DblTek GoIP devices. Can generate responses to specified challenges, test hosts for the vulnerability, run commands on vulnerable hosts, and drop...
View ArticleLynis 2.4.7 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleRadio Hack Box - Tool to Demonstrate Vulnerabilities in Wireless Input Devices
The SySS Radio Hack Box is a proof-of-concept software tool to demonstrate the replay and keystroke injection vulnerabilities of the wireless keyboard Cherry B.Unlimited AES.RequirementsRaspberry...
View ArticleExploit Database - The official Exploit Database Repository
The Exploit Database is an archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers. Its aim is to serve as the most...
View ArticleWPForce - Wordpress Attack Suite
WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been...
View Article