Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

PiSavar - WiFi Pineapple Module (Analysis, Detect, Kill)

The goal of this project is to find out the fake access points opened by the WiFi pineapple device using the PineAP module and to prevent clients from being affected by initiating a deauthentication...

View Article


Image may be NSFW.
Clik here to view.

SweetSecurity - Network Security Monitoring on Raspberry Pi type devices

Scripts to setup and install Bro IDS, Elasticsearch, Logstash, Kibana, and Critical Stack on any device.Getting Sweet SecurityEither download the Github repository manually, or clone the repo with the...

View Article


Image may be NSFW.
Clik here to view.

Koadic - COM Command & Control Framework (JScript RAT)

Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic...

View Article

Image may be NSFW.
Clik here to view.

Algo VPN - Set up a personal IPSEC VPN in the cloud

Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It uses the most secure defaults available, works with common cloud providers, and does not require client software...

View Article

Image may be NSFW.
Clik here to view.

Plecost v1.1.1 - Wordpress Finger Printer Tool

What's Plecost?Plecost is a vulnerability fingerprinting and vulnerability finder for Wordpress blog engine.Why?There are a huge number of Wordpress around the world. Most of them are exposed to be...

View Article


Image may be NSFW.
Clik here to view.

SJET - JMX Exploitation Toolkit

Java Management Extensions (JMX) is a Java technology that supplies tools for managing and monitoring applications, system objects, devices (such as printers) and service-oriented networks. Those...

View Article

Image may be NSFW.
Clik here to view.

faker.js - Generate Massive Amounts of Fake Data

Generate massive amounts of fake data in Node.js and the browser.Demohttps://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.htmlHosted API Microservicehttp://faker.hook.ioSupports all...

View Article

Image may be NSFW.
Clik here to view.

Udp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic...

A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls (or Unstable UDP Environment). Its Encrypted, Anti-Replay and Multiplexed.It also acts as...

View Article


Image may be NSFW.
Clik here to view.

dockerscan - Docker Security Analysis and Hacking Tools

What's dockerscanA Docker analysis toolsVery quick install> python3.5 -m pip install -U pip> python3.5 -m pip install dockerscanShow options:> dockerscan -hAvailable actionsCurrently Docker...

View Article


Image may be NSFW.
Clik here to view.

Cansina - Web Content Discovery Tool

Cansina is a Web Content Discovery Application. It is well known Web applications don't publish all their resources or public links, so the only way to discover these resources is requesting for them...

View Article

Image may be NSFW.
Clik here to view.

EggShell - iOS/macOS Remote Administration Tool

EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python. This tool creates 1 line multi stage payloads that give you a command line session with extra functionality....

View Article

Image may be NSFW.
Clik here to view.

Bytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite...

Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX...

View Article

Image may be NSFW.
Clik here to view.

Portia - Automate Techniques Commonly Performed On Internal Network...

Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised:Privilege escalationLateral...

View Article


Image may be NSFW.
Clik here to view.

mitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container

Turn any linux computer into a public Wi-Fi network that silently mitms all http traffic. Runs inside a Docker container using hostapd, dnsmasq, and mitmproxy to create a open honeypotwireless network...

View Article

Image may be NSFW.
Clik here to view.

RedBoard - Collaborative Web Dashboard for RedTeam Pentesters

RedBoard is a collaborative web dashboard for RedTeam pentesters.While conducting a pentest, you're inclined to create a lot of text files in random directories on your laptop. RedBoard is a...

View Article


Image may be NSFW.
Clik here to view.

WPScan v2.9.4 - Black Box WordPress Vulnerability Scanner

WPScan is a black box WordPress vulnerability scanner.INSTALLWPScan comes pre-installed on the following Linux distributions:BackBox LinuxKali LinuxPentooSamuraiWTFBlackArchOn macOS WPScan is packaged...

View Article

Image may be NSFW.
Clik here to view.

Posh-SSH - PowerShell Module for automating tasks on remote systems using SSH

Windows Powershell module that leverages a custom version of the SSH.NET Library http://sshnet.codeplex.com/ to provide basic SSH functionality in Powershell. The main purpose of the module is to...

View Article


Image may be NSFW.
Clik here to view.

iWant - CLI Based Decentralized Peer To Peer File Sharing

A commandline tool for searching and downloading files in LAN network, without any central server.FeaturesDecentralized : There is no central server hosting files. Therefore, no central point of...

View Article

Image may be NSFW.
Clik here to view.

Knockpy - Enumerate Subdomain Scanner

Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically...

View Article

Image may be NSFW.
Clik here to view.

ike-scan - Discover and fingerprint IKE hosts (IPsec VPN Servers)

Discover and fingerprint IKE hosts (IPsec VPN Servers).Building and Installingike-scan uses the standard GNU autoconf and automake tools, so installation is the normal process:Run git clone...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>