Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

AQUATONE - A Tool for Domain Flyovers

AQUATONE is a set of tools for performing reconnaissance on domain names. It can discover subdomains on a given domain by using open sources as well as the more common subdomain dictionary brute force...

View Article


Image may be NSFW.
Clik here to view.

PPEE (Puppy) - Professional PE file Explorer for reversers and malware...

There are lots of tools out there for statically analyzing malicious binaries, but they are ordinary tools for ordinary files.Puppy is a lightweight yet strong tool for static investigation of...

View Article


Image may be NSFW.
Clik here to view.

Zeus - AWS EC2 / S3 Auditing & Hardening Tool

Zeus is a powerful tool for AWS EC2 / S3 best hardening practices. It checks security settings according to the profiles the user creates and changes them to recommended settings based on the CIS AWS...

View Article

Image may be NSFW.
Clik here to view.

Debinject - Inject malicious code into *.debs

Inject malicious code into *.debsCLONEgit clone https://github.com/UndeadSec/Debinject.gitRUNNINGcd Debinjectpython debinject.pyIf you have another version of Python:python2.7 debinject.pyRUN ON TARGET...

View Article

Image may be NSFW.
Clik here to view.

Dr0p1t Framework 1.3 - A Framework That Creates An Advanced FUD Dropper With...

Have you ever heard about trojan droppers ? In short dropper is type of trojans that downloads other malwares and Dr0p1t gives you the chance to create a stealthy dropper that bypass most AVs and have...

View Article


Image may be NSFW.
Clik here to view.

GShark Framework - Check all your backdoors with only one telegram account

This framework can perform web post exploitation, with this you can interact with multiple web backdoor and execute custom module, script.Check all your backdoors with only one telegram messenger...

View Article

Image may be NSFW.
Clik here to view.

Steamer - Import, Search, and Manage Public Password Breach Data

Import, manage, search public dumps.Do you have massive amounts of CSV, .sql, .txt, that have credentials, passwords, and hashes inside? Use Steamer to manage them! Load them into a MongoDB database,...

View Article

Image may be NSFW.
Clik here to view.

Exif-Remove - Command Line Tool- Remove Exif Data from all Digital Pictures

This tool is made in Python 2.7 compiled using pyinstaller for Windows OS. Nothing is special about this tool it just eases the work for me, maybe will for you too.For what reason?Exif is Metadata...

View Article


Image may be NSFW.
Clik here to view.

Inspector - Privilege Escalation Unix Helper

Inspector is a python script for help in privilege escalation, for linux environement. After starting, this script search the kernel version and check if is exploit exists, load file history...

View Article


Image may be NSFW.
Clik here to view.

Magic Wormhole - Get Things From One Computer To Another, Safely

This package provides a library and a command-line tool named wormhole, which makes it possible to get arbitrary-sized files and directories (or short pieces of text) from one computer to another. The...

View Article

Image may be NSFW.
Clik here to view.

LFISuite - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner

LFI Suite is a totally automatic tool able to scan and exploit Local File Inclusion vulnerabilities using many different methods of attack, listed in the section Features. Features Works with Windows,...

View Article

Image may be NSFW.
Clik here to view.

Winpayloads - Undetectable Windows Payload Generation

Winpaylods is a payload generator tool that uses metasploits meterpreter shellcode, injects the users ip and port into the shellcode and writes a python file that executes the shellcode using ctypes....

View Article

Image may be NSFW.
Clik here to view.

Lynis 2.5.2 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article


Image may be NSFW.
Clik here to view.

Shodanwave - Explore & Obtain Information from Netwave IP Camera

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that makes it easy to search for cameras online but...

View Article

Image may be NSFW.
Clik here to view.

TorStat - Tor Statistics

Tor StatisticsRequirementsProxyChains (Optional - only if you need more features to work)ColoramapsutilInstallation and executionThen you can download smap by cloning the Git repository:git clone...

View Article


Image may be NSFW.
Clik here to view.

Burp Vulners Scanner - Vulnerability scanner based on vulners.com search API

Burp Suite scanner plugin based on Vulners.com vulnerability database APISearch fingerprints in HTTP response (inspired by plugin "Software Version Reporter") and check found version in vulners.com...

View Article

Image may be NSFW.
Clik here to view.

smap - Shellcode Mapper

Handy tool for shellcode analysis.Demo videoRequirementsobjdumpInstallation and executionThen you can download smap by cloning the Git repository:git clone https://github.com/suraj-root/smap.gitcd...

View Article


Image may be NSFW.
Clik here to view.

CHAOS Framework - Generate Payloads and Control Remote Machines

CHAOS Framework allows generate payloads and controls remote machines.DISCLAIMERThe use of the CHAOS Framework is COMPLETE RESPONSIBILITY of the END-USER. Developer assumes NO liability and is NOT...

View Article

Image may be NSFW.
Clik here to view.

AhMyth Android RAT - Android Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration ToolBeta VersionIt consists of two parts:Server side: desktop application based on electron framework (control panel)Client side: Android...

View Article

Image may be NSFW.
Clik here to view.

CloudFail - Utilize misconfigured DNS and old database records to find hidden...

CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>