SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) Firewall
SCUTUM - Linux Automatic ARP (TCP / UDP / ICMP) FirewallCurrent Version Change log:Added Self-Upgrading Function, now users can execute self-upgrading with $ sudo scutum --upgradeAdded AVALON Framework...
View ArticleExe2Image - A simple utility to convert EXE files to JPEG images and vice versa.
A simple utility to convert EXE files to PNG images and vice versa.Putty.exe converted to an image.Download Exe2Image
View Articleradare2 - Unix-Like Reverse Engineering Framework And Commandline Tools
r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files.The radare project started as a forensics tool, a scriptable command-line hexadecimal...
View ArticlePowerShdll - Run PowerShell with rundll32 (Bypass software restrictions)
Run PowerShell with dlls only. Does not require access to powershell.exe as it uses powershell automation dlls.dll mode:Usage:rundll32 PowerShdll,main <script>rundll32 PowerShdll,main -f...
View ArticleCrackMapExec v3.1.5 - A Swiss Army Knife For Pentesting Networks
CrackMapExec (a.k.a CME) is a post-exploitation tool that helps automate assessing the security of large Active Directory networks. Built with stealth in mind, CME follows the concept of "Living off...
View ArticleDBeaver - Free Universal DataBase Manager and SQL Client
Free multi-platform database tool for developers, SQL programmers, database administrators and analysts. Supports any database which has JDBC driver (which basically means - ANY database). EE version...
View ArticleBloodHound - Six Degrees of Domain Admin
BloodHound is a single page Javascript web application, built on top of Linkurious, compiled with Electron, with a Neo4j database fed by a PowerShell ingestor.BloodHound uses graph theory to reveal the...
View ArticleTails 3.2 - Live System to Preserve Your Privacy and Anonymity
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no...
View ArticleThunderShell - PowerShell based RAT
ThunderShell is a Powershell based RAT that rely on HTTP request to communicate. All the network traffic is encrypted using a second layer of RC4 to avoid SSL interception and defeat network...
View Article--- Article Removed ---
*** *** *** RSSing Note: Article removed by member request. *** ***
View ArticleBitCracker - BitLocker Password Cracking Tool (Windows Encryption Tool)
BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password cracking tool for memory units encrypted...
View ArticleIronsquirrel - Encrypted Exploit Delivery for the Masses
This project aims at delivering browser exploits to the victim browser in an encrypted fashion. Ellyptic-curve Diffie-Hellman (secp256k1) is used for key agreement and AES is used for encryption.By...
View ArticleSMBMap - Samba Share Enumeration Tool
SMBMap allows users to enumerate samba share drives across an entire domain. List share drives, drive permissions, share contents, upload/download functionality, file name auto-download pattern...
View ArticleTeleShadow - Telegram Desktop Session Stealer (Windows)
Stealing desktop telegrams has never been so easy !Set the email and sender details of the sender and recipient and send it to the victim after compiling.How do I use the session file?Delete everything...
View Articlehabu - Network Hacking Toolkit
Habu is to teach (and learn) some concepts about Python and Network Hacking.These are basic functions that help with some tasks for Ethical Hacking and Penetration Testing.Most of them are related with...
View ArticleXCat - Automate XPath Injection Attacks to Retrieve Documents
XCat is a command line program that aides in the exploitation of blind XPath injection vulnerabilities. It can be used to retrieve the whole XML document being processed by a vulnerable XPath query,...
View Articleparameth - Tool to brute discover GET and POST parameters
This tool can be used to brute discover GET and POST parameters.Often when you are busting a directory for common files, you can identify scripts (for example test.php) that look like they need to be...
View ArticleDradis Framework - Collaboration and reporting for IT Security teams
Dradis is an open-source collaboration framework, tailored to InfoSec teams.GoalsShare the information effectively.Easy to use, easy to be adopted. Otherwise it would present little benefit over other...
View ArticleWifite 2 - A complete re-write of Wifite (Automated Wireless Attack Tool)
A complete re-write of wifite, a Python script for auditing wireless networks.What's new?Lots of files instead of "one big script".Cleaner process management -- No longer leaves processes running in...
View ArticleFruityC2 - Post-Exploitation Tool to Manage Compromised Machines from a Web...
This is the initial release for FruityC2 (alpha version). Can be installed on any linux system, but the installation scripts are made for Debian based systems. There are a lot of functionalities that...
View Article