massExpConsole - Collection of Tools and Exploits with a CLI UI
Collection of Tools and Exploits with a CLI UIWhat does it do?an easy-to-use user interface (cli)execute any adapted exploit with process-level concurrencycrawler for baidu and zoomeyea simple webshell...
View Articleexplo - Human And Machine Readable Web Vulnerability Testing Format
explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of...
View ArticleFaraday v2.5 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleWPSeku v0.2 - Wordpress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.ScreenshotsDownload WPSeku
View ArticleprobeSniffer - A Tool for Sniffing Unencrypted Wireless Probe Requests from...
____ ____ ___ ____ ___ _________ ____ _____ _____ ___ ____ | \| \ / \| \ / _/ ___| \| | | |/ _| \ | o | D | | o )/ [( \_| _ || || __| __/ [_| D ) | _/| /| O | | _\__ | | || || |_ | |_| _| / | | | \| |...
View Articlepwned - A command-line tool for querying the 'Have I been pwned?' service
A command-line tool for querying Troy Hunt's Have I been pwned? service using the hibp Node.js module.Installationnpm install pwned -gUsageUsage: pwned [option | command]Commands: ba [options]...
View ArticleInjectProc - InjectProc - Process Injection Techniques
Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors.There are several techniques, which are commonly used: DLL injection, process...
View ArticleportSpider - A Lightning Fast Multithreaded Network Scanner Framework With...
A lightning fast multithreaded network scanner framework with modules.modules:http - Scan for open HTTP ports, and get the the titles.mysql - Scan for open MySQL servers, and try to log in with the...
View ArticlePRET - Printer Exploitation Toolkit
PRET is a new tool for printer security testing developed in the scope of a Master's Thesis at Ruhr University Bochum. It connects to a device via network or USB and exploits the features of a given...
View ArticleBruteSploit - Collection Of Method For Automated Generate, Bruteforce And...
BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF...
View ArticleDATA - Credential Phish Analysis and Automation
Credential Phish Analysis and AutomationBUCKLEGRIPPER (py)Given a suspected phishing url or file of line separated urls, visit, screenshot, and scrape for interesting files.Requirements can be...
View Articlekwetza - Python script to inject existing Android applications with a...
Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload.What does it do?Kwetza infects an existing Android application with either custom or default...
View ArticleDomain Hunter - Checks Expired Domains, Bluecoat Categorization, And...
Domain name selection is an important aspect of preparation for penetration tests and especially Red Team engagements. Commonly, domains that were used previously for benign purposes and were properly...
View ArticleHeimdall - Manage Vulnerables Packages in your *nix Servers (in a centralized...
It's a tool to manage vulnerables packages in your *nix servers, in a centralized way.How to installgit clone https://github.com/mthbernardes/heimdall_webserver.gitcd heimdall_webserverchmod +x...
View Articlepymultitor - Python Multi Threaded Tor Proxy
Did you ever want to be at two different places at the same time?While performing penetration tests there are often problems caused by security devices that block the "attacking" IP.With a large...
View Articlehackerbot - Chat With Hacker Assistant
Chat with your assistant and enjoy hackingThis bot is a combination of chatbot and hacking toolsChattingTwitter account analysisUrl scanFile scanIp scanLinux enumerationLinux priv escalation...
View ArticleBelati - The Traditional Swiss Army Knife for OSINT
Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose. This tools is inspired by Foca and Datasploit for OSINT.What Belati can...
View Articletcconfig - A Simple Tc Command Wrapper Tool
A Simple tc command wrapper tool. Easy to set up traffic control of network bandwidth/latency/packet-loss to a network interface.Traffic control featuresTrafic shaping targetApply traffic shaping rules...
View ArticleHashcat v3.6.0 - World's Fastest and Most Advanced Password Recovery Utility
hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs,...
View ArticleTails 3.0 - Live System to Preserve Your Privacy and Anonymity
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no...
View Article