Mr.SIP - SIP-Based Audit and Attack Tool
Mr.SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches and...
View ArticleOWASP ZSC - Shellcode/Obfuscate Code Generator
OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under...
View ArticleYuki Chan - Automate Pentest Tool
The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you.WARNINGI highly recommend using this tool by using Kali Linux OS By using this...
View ArticleLaZagne v2.2 - Credentials Recovery Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom...
View ArticleReaver - Attack against Wi-Fi Protected Setup (WPS)
Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of...
View ArticleInventus - A Spider Designed To Find Subdomains Of A Specific Domain By Crawling
Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers. It's a Scrapy spider, meaning it's easily modified and extendable to your...
View Articlednsenum - Multithreaded perl script to enumerate DNS information
Multithreaded perl script to enumerate DNS information of a domain and to discover non-contiguous ip blocks.OPERATIONS:Get the host’s addresse (A record).Get the namservers (threaded).Get the MX record...
View Articleoutis - Custom Remote Administration Tool (RAT)
outis is a custom Remote Administration Tool (RAT) or something like that. Think Meterpreter or Empire-Agent. However, the focus of this tool is neither an exploit toolkit (there are no exploits) nor...
View ArticlePharos - Static Binary Analysis Framework
The Pharos static binary analysis framework is a project of the Software Engineering Institute at Carnegie Mellon University. The framework is designed to facilitate the automated analysis of binary...
View Articledcrawl - Simple, But Smart, Multi-Threaded Web Crawler For Randomly Gathering...
dcrawl is a simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.How it works?dcrawl takes one site URL as input and detects all <a href=...>...
View Articledorkbot - Scan Google Search Results for Vulnerabilities
dorkbot is a modular command-line tool for performing vulnerability scans against a set of webpages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two...
View ArticleHijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a...
View ArticleKali Linux 2017.2 Release - The Best Penetration Testing Distribution
In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a dozen new tools to the repositories, a few of which are listed below....
View ArticleVPNPivot - Explore Internal Networks
Sometime we do external penetration testing and when we compromise the remote target we would like to explore the internal network behind and getting such compromise like owning Active directory,...
View Articlednscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS...
dnscat2 is a DNS tunnel that WON'T make you sick and kill you!This tool is designed to create an encrypted command-and-control (C&C) channel over the DNS protocol, which is an effective tunnel out...
View ArticleTCPCopy - A TCP Stream Replay Tool
TCPCopy is a TCP stream replay tool to support real testing of Internet server applications.DescriptionAlthough the real live flow is important for the test of Internet server applications, it is hard...
View ArticleZeus Scanner - Advanced Dork Searching Utility
Zeus is a advanced dork searching tool that is capable of bypassing search engine API calls, search engine captchas, and IP address blocking from sending many requests to the search engine itself. Zeus...
View ArticleLFiFreak - An automated LFi Exploiter with Bind/Reverse Shells
LFiFreak is a tool for exploiting local file inclusions using PHP Input, PHP Filter and Data URI methods.FeaturesWorks with Windows, Linux and OS XIncludes bind and reverse shell for both Windows and...
View Articlemacphish - Office for Mac Macro Payload Generator
Office for Mac Macro Payload Generator.Attack vectorsThere are 4 attack vectors available:beaconcredsmeterpretermeterpreter-grantFor the 'creds' method, macphish can generate the Applescript script...
View Articleclusterd - Application Server Attack Toolkit
clusterd is an open source application server attack toolkit. Born out of frustration with current fingerprinting and exploitation methods, clusterd automates the fingerprinting, reconnaissance, and...
View Article