SQLiv - Massive SQL Injection Vulnerability Scanner
Massive SQL injection vulnerability scanner.Featuresmultiple domain scanning with SQL injection dork by Bing, Google, or Yahootargetted scanning by providing specific domain (with crawling)reverse...
View Articlesqlmate - Tool which will do what you always expected from SQLmap
There are some features that we think SQLMap should have. Like finding admin panel of the target, better hash cracking etc. If you think the same, SQLMate is for you.What it does?Feed it a SQL...
View ArticleRekall v1.7 - Forensic and Incident Response Framework
The Rekall Framework is a completely open collection of tools, implemented in Python under the Apache and GNU General Public License, for the extraction and analysis of digital artifacts computer...
View ArticlePentest-Tools-Auto-Installer - A Simple Tool For Installing Pentest Tools And...
A Simple tool for installing pentest tools and forensic tools on Debian / Ubuntu Based OSTested on Linux Mint And Kali LinuxI Want To Get This How To Do ??Change Your Privileges Terminal to Root...
View ArticleNikto v2.1.6 - Web Server Scanner
Nikto is an Open Source (GPL) web server scanner which performs comprehensive tests against web servers for multiple items, including over 6700 potentially dangerous files/programs, checks for outdated...
View ArticleASLRay - Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying
Linux ELF x32 and x64 ASLR bypass exploit with stack-spraying.Properties:ASLR bypassCross-platformMinimalisticSimplicityUnpatchableDependencies:Linux 2.6.12+ - will work on any x86-64 Debian-based...
View ArticleExitmap - A Fast and Modular Scanner for TOR Exit Relays
Exitmap is a fast and modular Python-based scanner for Tor exit relays. Exitmap modules implement tasks that are run over (a subset of) all exit relays. If you have a background in functional...
View ArticleTweep - An Advanced Twitter Scraping Tool
Tweep is an advanced Twitterscraping tool written in python that allows for scraping Tweets and pictures from Twitter profiles without using Twitter's API.BenefitsSome of the benefits of using Tweep vs...
View Articlesubjack - Hostile Subdomain Takeover tool written in Go
subjack is a Hostile Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go's speed and efficiency, this tool...
View ArticleLynis 2.5.7 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleHashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility
hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs,...
View ArticleTROMMEL - Sift Through Directories of Files to Identify Indicators That May...
TROMMEL sifts through directories of files to identify indicators that may contain vulnerabilities. TROMMEL identifies the following indicators related to:Secure Shell (SSH) key filesSecure Socket...
View ArticleDiamorphine - LKM Rootkit for Linux Kernels 2.6.x/3.x/4.x
Diamorphine is a LKM rootkit for Linux Kernels 2.6.x/3.x/4.xFeaturesWhen loaded, the module starts invisible;Hide/unhide any process by sending a signal 31;Sending a signal 63(to any pid) makes the...
View ArticlePhishruffus - Intelligent Threat Hunter And Phishing Servers
Phishruffus is a tool designed to identify threats and malicious DNS servers on the Internet that are used for the illicit practice of bank phishing. Usage: $ pip install -r requirements.txt$...
View Articlenullinux - SMB null Session Identification and Enumeration Tool
nullinux is an internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB null sessions. Unlike many of the...
View ArticleHouseProxy - HTTP proxy focused on block phishing URL's
Protect your parents from phishing, HTTP proxy focused on block phishing URL'sInstallgit clone https://github.com/mthbernardes/HouseProxy.gitcd HouseProxy/pip install -r requeriments.txtConfigEdit...
View ArticleTelnet IoT Honeypot - Python Telnet Honeypot For Catching Botnet Binaries
This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default passwords on telnet servers on the internet.Other than...
View ArticleTrape - People tracker on the Internet: Learn to track the world, to avoid...
Trape is a recognition tool that allows you to track people, the information you can get is very detailed. We want to teach the world through this, as large Internet companies could monitor you,...
View ArticleKernelpop - Kernel Privilege Escalation Enumeration And Exploitation Framework
kernelpop is a framework for performing automated kernel exploit enumeration on Linux, Mac, and Windows hosts.Requirementspython3Currently supported...
View ArticleStriker - Offensive Information And Vulnerability Scanner
Striker is an offensive information and vulnerability scanner.FeaturesJust supply a domain name to Striker and it will automatically do the following for you:Check and Bypass CloudflareRetrieve Server...
View Article