AQUATONE - A Tool for Domain Flyovers
AQUATONE is a set of tools for performing reconnaissance on domain names. It can discover subdomains on a given domain by using open sources as well as the more common subdomain dictionary brute force...
View ArticlePPEE (Puppy) - Professional PE file Explorer for reversers and malware...
There are lots of tools out there for statically analyzing malicious binaries, but they are ordinary tools for ordinary files.Puppy is a lightweight yet strong tool for static investigation of...
View ArticleZeus - AWS EC2 / S3 Auditing & Hardening Tool
Zeus is a powerful tool for AWS EC2 / S3 best hardening practices. It checks security settings according to the profiles the user creates and changes them to recommended settings based on the CIS AWS...
View ArticleDebinject - Inject malicious code into *.debs
Inject malicious code into *.debsCLONEgit clone https://github.com/UndeadSec/Debinject.gitRUNNINGcd Debinjectpython debinject.pyIf you have another version of Python:python2.7 debinject.pyRUN ON TARGET...
View ArticleDr0p1t Framework 1.3 - A Framework That Creates An Advanced FUD Dropper With...
Have you ever heard about trojan droppers ? In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chance to create a stealthy dropper that bypass most AVs and have...
View ArticleGShark Framework - Check all your backdoors with only one telegram account
This framework can perform web post exploitation, with this you can interact with multiple web backdoor and execute custom module, script.Check all your backdoors with only one telegram messenger...
View ArticleSteamer - Import, Search, and Manage Public Password Breach Data
Import, manage, search public dumps.Do you have massive amounts of CSV, .sql, .txt, that have credentials, passwords, and hashes inside? Use Steamer to manage them! Load them into a MongoDB database,...
View ArticleExif-Remove - Command Line Tool- Remove Exif Data from all Digital Pictures
This tool is made in Python 2.7 compiled using pyinstaller for Windows OS. Nothing is special about this tool it just eases the work for me, maybe will for you too.For what reason?Exif is Metadata...
View ArticleInspector - Privilege Escalation Unix Helper
Inspector is a python script for help in privilege escalation, for linux environement. After starting, this script search the kernel version and check if is exploit exists, load file history...
View ArticleMagic Wormhole - Get Things From One Computer To Another, Safely
This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The...
View ArticleLFISuite - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
LFI Suite is a totally automatic tool able to scan and exploit Local File Inclusion vulnerabilities using many different methods of attack, listed in the section Features. Features Works with Windows,...
View ArticleWinpayloads - Undetectable Windows Payload Generation
Winpaylods is a payload generator tool that uses metasploits meterpreter shellcode, injects the users ip and port into the shellcode and writes a python file that executes the shellcode using ctypes....
View ArticleLynis 2.5.2 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleShodanwave - Explore & Obtain Information from Netwave IP Camera
Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that makes it easy to search for cameras online but...
View ArticleTorStat - Tor Statistics
Tor StatisticsRequirementsProxyChains (Optional - only if you need more features to work)ColoramapsutilInstallation and executionThen you can download smap by cloning the Git repository:git clone...
View ArticleBurp Vulners Scanner - Vulnerability scanner based on vulners.com search API
Burp Suite scanner plugin based on Vulners.com vulnerability database APISearch fingerprints in HTTP response (inspired by plugin "Software Version Reporter") and check found version in vulners.com...
View Articlesmap - Shellcode Mapper
Handy tool for shellcode analysis.Demo videoRequirementsobjdumpInstallation and executionThen you can download smap by cloning the Git repository:git clone https://github.com/suraj-root/smap.gitcd...
View ArticleCHAOS Framework - Generate Payloads and Control Remote Machines
CHAOS Framework allows generate payloads and controls remote machines.DISCLAIMERThe use of the CHAOS Framework is COMPLETE RESPONSIBILITY of the END-USER. Developer assumes NO liability and is NOT...
View ArticleAhMyth Android RAT - Android Remote Administration Tool
AhMyth Android RAT is an Android Remote Administration ToolBeta VersionIt consists of two parts:Server side: desktop application based on electron framework (control panel)Client side: Android...
View ArticleCloudFail - Utilize misconfigured DNS and old database records to find hidden...
CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all...
View Article