SimplyEmail - Email Recon Made Fast And Easy
This tool was based on the work of theHarvester and kind of a port of the functionality. This was just an expansion of what was used to build theHarvester and will incorporate his work but allow users...
View ArticleTwiga - A Tool That Enumerates Android Devices For Information Useful In...
A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports android 4.2 to android 7.1.1RequirementsThe most current ADB must...
View ArticlePythem - Penetration Testing Framework
pythem is a multi-purpose pentest framework written in Python. It has been developed to be used by security researchers and security professionals. The tool intended to be used only for acts within the...
View ArticleRastLeak - Tool To Automatic Leak Information Using Hacking With Engine Searches
Tool to automatic leak information using Hacking with engine searches.How to installInstall requirements with:pip install -r requirements.txtHow to use:python rastleak.pyUsage:$ python rastleak.py...
View ArticleDracnmap v2.2 - Exploit Network and Gathering Information with Nmap
Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and...
View ArticleJKS Private Key Cracker - Cracking passwords of private key entries in a JKS...
The Java Key Store (JKS) is the Java way of storing one or several cryptographic private and public keys for asymmetric cryptography in a file. While there are various key store formats, Java and...
View ArticleSSH MITM - SSH Man-In-The-Middle Tool
This penetration testing tool allows an auditor to intercept SSH connections. A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH...
View ArticleVulnreport - Pentesting Management And Automation Platform
Vulnreport is a platform for managing penetration tests and generating well-formatted, actionable findings reports without the normal overhead that takes up security engineer's time. The platform is...
View ArticleSn1per - Automated PenTest Recon Scanner
Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.DEMO VIDEO:FEATURES:Automatically collects basic recon (ie. whois, ping, DNS,...
View ArticleCookieCatcher - Tool to assist in the exploitation of XSS
CookieCatcher is an open source application which was created to assist in the exploitation of XSS (Cross Site Scripting) vulnerabilities within web applications to steal user session IDs (aka Session...
View ArticleArachni v1.5.1 - Web Application Security Scanner Framework
Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.It is smart, it trains itself...
View ArticleXSStrike v1.2 - Fuzz, Crawl and Bruteforce Parameters for XSS
XSStrike is a python script designed to detect and exploit XSS vulnerabilites.A list of features XSStrike has to offer:Fuzzes a parameter and builds a suitable payloadBruteforces paramteres with...
View ArticleNmap 7.60 - Free Security Scanner For Network Exploration & Security Audits
Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory,...
View ArticleFaraday v2.6 - Collaborative Penetration Test and Vulnerability Management...
Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard...
View ArticleBAF - Blind Attacking Framework
What is BAF ? it's a framework written in python [2.7] that is being made specially for blind attacking , ie : attacking random targets with common security issues , targets are generated by the...
View ArticleMercure - A Tool For Security Managers Who Want To Train Their Colleague To...
Mercure is a tool for security managers who want to teach their colleagues about phishing.What Mercure can do:Create email templatesCreate target listsCreate landing pagesHandle attachmentsLet you keep...
View ArticleUniversal Radio Hacker - Investigate Wireless Protocols Like A Boss
The Universal Radio Hacker is a software for investigating unknown wireless protocols. Features includehardware interfaces for common Software Defined Radioseasy demodulation of signalsassigning...
View ArticleWiFi Bruteforcer - Android application to brute force WiFi passwords (No Root...
WARNING: This project is still under development and by installing the app may misconfigure the Wi-Fi settings of your Android OS, a system restore may be necessary to fix it.Android application to...
View Articlelscript - This script will make your life easier, and of course faster
This is a script that automates many procedures about wifi penetration and hacking.FeaturesEnabling-Disabling interfaces faster Changing Mac faster Anonymizing yourself faster View your public IP...
View ArticleCyberChef - The Cyber Swiss Army Knife [A Web App For Encryption, Encoding,...
The Cyber Swiss Army KnifeCyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding like XOR or Base64,...
View Article