Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

TorWall - Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also...

View Article


Image may be NSFW.
Clik here to view.

Nzyme - Collects 802.11 Management Frames And Sends Them To A Graylog Setup...

Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a...

View Article


Image may be NSFW.
Clik here to view.

WebBreaker - Dynamic Application Security Test Orchestration (DASTO)

Build functional security testing, into your software development and release cycles! WebBreaker provides the capabilities to automate and centrally manage Dynamic Application Security Testing (DAST)...

View Article

Image may be NSFW.
Clik here to view.

Vanquish - Kali Linux based Enumeration Orchestrator

Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results...

View Article

Image may be NSFW.
Clik here to view.

Wfuzz - Web Application Fuzzer

Wfuzz has been created to facilitate the task in web applications assessments and it is based on a simple concept: it replaces any reference to the FUZZ keyword by the value of a given payload.A...

View Article


Image may be NSFW.
Clik here to view.

AWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets

AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It's similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow...

View Article

Image may be NSFW.
Clik here to view.

Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB).

A slow data siphon for MySQL/MariaDB using bitwise operation on printable ASCII characters, via a blind-SQL injection.UsageUSAGE:blisqy.py --server <Web Server> --port <port> --header...

View Article

Image may be NSFW.
Clik here to view.

NIELD v0.6.1 - Network Interface Events Logging Daemon

NIELD (Network Interface Events Logging Daemon) is a tool to receive notifications from kernel through netlink socket, and generate logs related to interfaces, neighbor cache (ARP,NDP), IP address...

View Article


Image may be NSFW.
Clik here to view.

OSXAuditor - Free Mac OS X Computer Forensics Tool

OS X Auditor is a free Mac OS X computer forensics tool.OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:the kernel extensionsthe...

View Article


Image may be NSFW.
Clik here to view.

RHAPIS - Network Intrusion Detection Systems Simulator

Network intrusion detection systems simulator. RHAPIS provides a simulation environment through which user is able to execute any IDS operation.Basic UsageType HELP in the console in order to see the...

View Article

Image may be NSFW.
Clik here to view.

Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites

A script to find admin login pages and EAR vulnerabilites.FeaturesMulti-threading on demandBig path list (798 paths)Supports php, asp and html extensionsChecks for potential EAR vulnerabilitesChecks...

View Article

Image may be NSFW.
Clik here to view.

psad - Intrusion Detection and Log Analysis with iptables

The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans...

View Article

Image may be NSFW.
Clik here to view.

FLOSS - FireEye Labs Obfuscated String Solver (Automatically extract...

Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of an executable. Often, these portions are strings and...

View Article


Image may be NSFW.
Clik here to view.

Cameradar v2.0 - Hack into RTSP CCTV cameras

An RTSP stream access tool that comes with its library.Cameradar allows you toDetect open RTSP hosts on any accessible target hostDetect which device model is streamingLaunch automated dictionary...

View Article

Image may be NSFW.
Clik here to view.

VHostScan - Virtual Host Scanner

A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages. First presented at SecTalks BNE in September 2017 (slidedeck).Key...

View Article


Image may be NSFW.
Clik here to view.

drinkme - Shellcode Testing Harness

drinkme is a shellcode test harness. It reads shellcode from stdin and executes it. This allows pentesters to quickly test their payloads before deployment.Formatsdrinkme can handle shellcode in the...

View Article

Image may be NSFW.
Clik here to view.

DET - (extensible) Data Exfiltration Toolkit

DET (is provided AS IS), is a proof of concept to perform Data Exfiltration using either single or multiple channel(s) at the same time.This is a Proof of Concept aimed at identifying possible DLP...

View Article


Image may be NSFW.
Clik here to view.

Anti-DDOS - Anti DDOS Bash Script

Programming Languages :BASHRUNroot@ismailtasdelen:~# bash ./anti-ddos.shCloning an Existing Repository ( Clone with HTTPS )git clone https://github.com/ismailtasdelen/Anti-DDOS.gitCloning an Existing...

View Article

Image may be NSFW.
Clik here to view.

ACLight - PowerShell Script for Advanced Discovery of Privileged Accounts...

ACLight is a tool for discovering privileged accounts through advanced ACLs (Access Lists) analysis. It includes the discovery of Shadow Admins in the scanned network.The tool queries the Active...

View Article

Image may be NSFW.
Clik here to view.

PowerSAP - Powershell SAP Assessment Tool

PowerSAP is a simple powershell re-implementation of popular & effective techniques of all public tools such as Bizploit, Metasploit auxiliary modules, or python scripts available on the Internet....

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>