Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Mr.SIP - SIP-Based Audit and Attack Tool

Mr.SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches and...

View Article


Image may be NSFW.
Clik here to view.

OWASP ZSC - Shellcode/Obfuscate Code Generator

OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under...

View Article


Image may be NSFW.
Clik here to view.

Yuki Chan - Automate Pentest Tool

The Yuki Chan is an Automated Penetration Testing tool this tool will auditing all standard security test method for you.WARNINGI highly recommend using this tool by using Kali Linux OS By using this...

View Article

Image may be NSFW.
Clik here to view.

LaZagne v2.2 - Credentials Recovery Project

The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom...

View Article

Image may be NSFW.
Clik here to view.

Reaver - Attack against Wi-Fi Protected Setup (WPS)

Reaver has been designed to be a robust and practical attack against Wi-Fi Protected Setup (WPS) registrar PINs in order to recover WPA/WPA2 passphrases. It has been tested against a wide variety of...

View Article


Image may be NSFW.
Clik here to view.

Inventus - A Spider Designed To Find Subdomains Of A Specific Domain By Crawling

Inventus is a spider designed to find subdomains of a specific domain by crawling it and any subdomains it discovers. It's a Scrapy spider, meaning it's easily modified and extendable to your...

View Article

Image may be NSFW.
Clik here to view.

dnsenum - Multithreaded perl script to enumerate DNS information

Multithreaded perl script to enumerate DNS information of a domain and to discover non-contiguous ip blocks.OPERATIONS:Get the host’s addresse (A record).Get the namservers (threaded).Get the MX record...

View Article

Image may be NSFW.
Clik here to view.

outis - Custom Remote Administration Tool (RAT)

outis is a custom Remote Administration Tool (RAT) or something like that. Think Meterpreter or Empire-Agent. However, the focus of this tool is neither an exploit toolkit (there are no exploits) nor...

View Article


Image may be NSFW.
Clik here to view.

Pharos - Static Binary Analysis Framework

The Pharos static binary analysis framework is a project of the Software Engineering Institute at Carnegie Mellon University. The framework is designed to facilitate the automated analysis of binary...

View Article


Image may be NSFW.
Clik here to view.

dcrawl - Simple, But Smart, Multi-Threaded Web Crawler For Randomly Gathering...

dcrawl is a simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.How it works?dcrawl takes one site URL as input and detects all <a href=...>...

View Article

Image may be NSFW.
Clik here to view.

dorkbot - Scan Google Search Results for Vulnerabilities

dorkbot is a modular command-line tool for performing vulnerability scans against a set of webpages returned by Google search queries in a given Google Custom Search Engine. It is broken up into two...

View Article

Image may be NSFW.
Clik here to view.

Hijacker v1.3 - All-in-One Wi-Fi Cracking Tools for Android

Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a...

View Article

Image may be NSFW.
Clik here to view.

Kali Linux 2017.2 Release - The Best Penetration Testing Distribution

In addition to all of the standard security and package updates that come to us via Debian Testing, we have also added more than a dozen new tools to the repositories, a few of which are listed below....

View Article


Image may be NSFW.
Clik here to view.

VPNPivot - Explore Internal Networks

Sometime we do external penetration testing and when we compromise the remote target we would like to explore the internal network behind and getting such compromise like owning Active directory,...

View Article

Image may be NSFW.
Clik here to view.

dnscat2 - Create an Encrypted Command & Control (C&C) Channel over the DNS...

dnscat2 is a DNS tunnel that WON'T make you sick and kill you!This tool is designed to create an encrypted command-and-control (C&C) channel over the DNS protocol, which is an effective tunnel out...

View Article


Image may be NSFW.
Clik here to view.

TCPCopy - A TCP Stream Replay Tool

TCPCopy is a TCP stream replay tool to support real testing of Internet server applications.DescriptionAlthough the real live flow is important for the test of Internet server applications, it is hard...

View Article

Image may be NSFW.
Clik here to view.

Zeus Scanner - Advanced Dork Searching Utility

Zeus is a advanced dork searching tool that is capable of bypassing search engine API calls, search engine captchas, and IP address blocking from sending many requests to the search engine itself. Zeus...

View Article


Image may be NSFW.
Clik here to view.

LFiFreak - An automated LFi Exploiter with Bind/Reverse Shells

LFiFreak is a tool for exploiting local file inclusions using PHP Input, PHP Filter and Data URI methods.FeaturesWorks with Windows, Linux and OS XIncludes bind and reverse shell for both Windows and...

View Article

Image may be NSFW.
Clik here to view.

macphish - Office for Mac Macro Payload Generator

Office for Mac Macro Payload Generator.Attack vectorsThere are 4 attack vectors available:beaconcredsmeterpretermeterpreter-grantFor the 'creds' method, macphish can generate the Applescript script...

View Article

Image may be NSFW.
Clik here to view.

clusterd - Application Server Attack Toolkit

clusterd is an open source application server attack toolkit. Born out of frustration with current fingerprinting and exploitation methods, clusterd automates the fingerprinting, reconnaissance, and...

View Article
Browsing all 5816 articles
Browse latest View live