changeme - A Default Credential Scanner
A default credential scanner.AboutGetting default credentials added to commercial scanners is often difficult and slow. changeme is designed to be simple to add new credentials without having to write...
View ArticleCyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation
CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country...
View Articlecve-search - A Tool To Perform Local Searches For Known Vulnerabilities
cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs.The main objective of the...
View ArticleIntRec-Pack - Intelligence and Reconnaissance Package/Bundle installer
Intelligence and Reconnaissance Package/Bundle installer.IntRec-Pack is a Bash script designed to download, install and deploy several quality OSINT, Recon and Threat Intelligence tools. Due to the...
View ArticleDorkNet - Selenium Powered Python Script To Automate Searching For Vulnerable...
Selenium powered Python script to automate searching the web for vulnerable applications.DorkNet can take a single dork or a list of dorks as arguments. After the proper command line arguments have...
View ArticleEllaScanner - Passive Web Scanner
Passive web scanner.EllaScanner is a simple passive web scanner. Using this tool you can simply check your site’s security state.Usage:./Start.py https:// or http://Scanning of the site consists...
View ArticleBlazy - Modern Login Bruteforcer Which Also Tests For CSRF, Clickjacking,...
Blazy is a modern login page bruteforcer.FeaturesEasy target selectionsSmart form and error detectionCSRF and Clickjacking ScannerCloudflare and WAF Detector90% accurate resultsChecks for login bypass...
View ArticleBaRMIe - Java RMI Enumeration And Attack Tool
BaRMIe is a tool for enumerating and attacking Java RMI (Remote Method Invocation) services.RMI services often expose dangerous functionality without adequate security controls, however RMI services...
View Articleobjection - Runtime Mobile Exploration
objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and their security posture without the need for a jailbroken or...
View ArticleSeccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis
Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan and on repeated scans.On repeated scan delta...
View ArticleMIDA-Multitool - Bash Script Purposed For System Enumeration, Vulnerability...
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.MIDA Multitool draws functionality from several of my previous scripts namely SysEnum and RootHelper...
View ArticleShadowSocks ConnecTion - A Wrapper Tool For Shadowsocks To Consistently...
A wrapper tool for shadowsocks to consistently bypass firewalls.Quick startAutomatically connectThe easiest way to run this tool is just type ssct in terminal, and ssct will acquire available...
View ArticleCloud Security Suite - One stop tool for auditing the security posture of AWS...
One stop tool for auditing the security posture of AWS.Pre-requisitesPython 2.7pipgitInstallationgit clone https://github.com/SecurityFTW/cs-suite.gitcd cs-suite/sudo python setup.pyNote - Generate a...
View Articlereflector - Burp plugin able to find reflected XSS on page in real-time while...
Burp Suite extension is able to find reflected XSS on page in real-time while browsing on web-site and include some features as:Highlighting of reflection in the response tab.Test which symbols is...
View ArticleExploit Pack - Penetration Testing Framework
Exploit Pack has been designed by an experienced team of software developers and exploit writers to automate processes so penetration testers can focus on what's really important. The threat. This...
View ArticleOWASP ZAP 2.6.0 - Penetration Testing Tool for Testing Web Applications
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security...
View ArticleLeakManager - A Tool To Help You Manage Your Leaks
A Tool To Help You Manage Your LeaksInstallsudo apt-get install mongodb-org screenpip3 install -r requeriments.txtUsagescreen -S leakManagerhug -f index.py -p 1337ORgunicorn index:__hug_wsgi__ -b...
View ArticleHow To Catch a Cheater
You have observed your partner and noticed some significant changes in behavior. They are more secretive about using their phone; they are working late or on the weekend; or they are not connecting...
View ArticleReptile - LKM Linux Rootkit
Reptile is a LKM rootkit for evil purposes. If you are searching stuff only for study purposes, see the demonstration codes.FeaturesGive root to unprivileged usersHide files and directoriesHide files...
View ArticleZeroDoor - A Script Written Lazily For Generating Cross-Platform Backdoors
A script written lazily for generating reverse shell backdoors on the go whenever you need without any hassle for your daily penetration needs . These backdoors are not James Bond high tech stuff but...
View Article