PiSavar - WiFi Pineapple Module (Analysis, Detect, Kill)
The goal of this project is to find out the fake access points opened by the WiFi pineapple device using the PineAP module and to prevent clients from being affected by initiating a deauthentication...
View ArticleSweetSecurity - Network Security Monitoring on Raspberry Pi type devices
Scripts to setup and install Bro IDS, Elasticsearch, Logstash, Kibana, and Critical Stack on any device.Getting Sweet SecurityEither download the Github repository manually, or clone the repo with the...
View ArticleKoadic - COM Command & Control Framework (JScript RAT)
Koadic, or COM Command & Control, is a Windows post-exploitation rootkit similar to other penetration testing tools such as Meterpreter and Powershell Empire. The major difference is that Koadic...
View ArticleAlgo VPN - Set up a personal IPSEC VPN in the cloud
Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It uses the most secure defaults available, works with common cloud providers, and does not require client software...
View ArticlePlecost v1.1.1 - Wordpress Finger Printer Tool
What's Plecost?Plecost is a vulnerability fingerprinting and vulnerability finder for Wordpress blog engine.Why?There are a huge number of Wordpress around the world. Most of them are exposed to be...
View ArticleSJET - JMX Exploitation Toolkit
Java Management Extensions (JMX) is a Java technology that supplies tools for managing and monitoring applications, system objects, devices (such as printers) and service-oriented networks. Those...
View Articlefaker.js - Generate Massive Amounts of Fake Data
Generate massive amounts of fake data in Node.js and the browser.Demohttps://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.htmlHosted API Microservicehttp://faker.hook.ioSupports all...
View ArticleUdp2raw-tunnel - A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic...
A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls (or Unstable UDP Environment). Its Encrypted, Anti-Replay and Multiplexed.It also acts as...
View Articledockerscan - Docker Security Analysis and Hacking Tools
What's dockerscanA Docker analysis toolsVery quick install> python3.5 -m pip install -U pip> python3.5 -m pip install dockerscanShow options:> dockerscan -hAvailable actionsCurrently Docker...
View ArticleCansina - Web Content Discovery Tool
Cansina is a Web Content Discovery Application. It is well known Web applications don't publish all their resources or public links, so the only way to discover these resources is requesting for them...
View ArticleEggShell - iOS/macOS Remote Administration Tool
EggShell is an iOS and macOS post exploitation surveillance pentest tool written in Python. This tool creates 1 line multi stage payloads that give you a command line session with extra functionality....
View ArticleBytecode Viewer - A Java 8 Jar & Android Apk Reverse Engineering Suite...
Bytecode Viewer is an Advanced Lightweight Java Bytecode Viewer, GUI Java Decompiler, GUI Bytecode Editor, GUI Smali, GUI Baksmali, GUI APK Editor, GUI Dex Editor, GUI APK Decompiler, GUI DEX...
View ArticlePortia - Automate Techniques Commonly Performed On Internal Network...
Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised:Privilege escalationLateral...
View Articlemitm-router - Man-in-the-middle Wireless Access Point Inside a Docker Container
Turn any linux computer into a public Wi-Fi network that silently mitms all http traffic. Runs inside a Docker container using hostapd, dnsmasq, and mitmproxy to create a open honeypotwireless network...
View ArticleRedBoard - Collaborative Web Dashboard for RedTeam Pentesters
RedBoard is a collaborative web dashboard for RedTeam pentesters.While conducting a pentest, you're inclined to create a lot of text files in random directories on your laptop. RedBoard is a...
View ArticleWPScan v2.9.4 - Black Box WordPress Vulnerability Scanner
WPScan is a black box WordPress vulnerability scanner.INSTALLWPScan comes pre-installed on the following Linux distributions:BackBox LinuxKali LinuxPentooSamuraiWTFBlackArchOn macOS WPScan is packaged...
View ArticlePosh-SSH - PowerShell Module for automating tasks on remote systems using SSH
Windows Powershell module that leverages a custom version of the SSH.NET Library http://sshnet.codeplex.com/ to provide basic SSH functionality in Powershell. The main purpose of the module is to...
View ArticleiWant - CLI Based Decentralized Peer To Peer File Sharing
A commandline tool for searching and downloading files in LAN network, without any central server.FeaturesDecentralized : There is no central server hosting files. Therefore, no central point of...
View ArticleKnockpy - Enumerate Subdomain Scanner
Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically...
View Articleike-scan - Discover and fingerprint IKE hosts (IPsec VPN Servers)
Discover and fingerprint IKE hosts (IPsec VPN Servers).Building and Installingike-scan uses the standard GNU autoconf and automake tools, so installation is the normal process:Run git clone...
View Article