BtleJuice Framework - Bluetooth Smart (LE) Man-in-the-Middle Framework
BtleJuice is a complete framework to perform Man-in-the-Middle attacks on Bluetooth Smart devices (also known as Bluetooth Low Energy). It is composed of:an interception corean interception proxya...
View ArticleGOSINT - Open Source Threat Intelligence Gathering and Processing Framework
The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and...
View ArticleBruteSpray v1.6.0 - Brute-Forcing from Nmap output (Automatically attempts...
BruteSpray takes nmap GNMAP/XML output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside...
View ArticleUsername Anarchy - Username Tools For Penetration Testing
Tools for generating usernames when penetration testing. Usernames are half the password brute force problem.This is useful for user account/password brute force guessing and username enumeration when...
View ArticleQubes OS - A Security-Oriented Operating System
Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and...
View ArticleRelayer - SMB Relay Attack Script
Relayer is an SMB relay Attack Script that automates all the necessary steps to scan for systems with SMB signing disabled and relaying authentication request to these systems with the objective of...
View ArticlePiKarma - Detects Wireless Network Attacks
Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)Working Principle for PiKarmaCollects all the packets from Wireless Network....
View ArticleWPHardening v1.6 - Fortify the security of any WordPress installation
Fortify the security of any WordPress installation. This tool releases new versions on a regular basis. Make sure to update your dependencies frequently to get the latest version. Check out the...
View ArticleMerlin - A cross-platform post-exploitation HTTP/2 Command & Control server...
Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.An introductory blog post can be found here:...
View ArticleFsociety Hacking Tools Pack - A Penetration Testing Framework
A Penetration Testing Framework , you will have evry script that a hacker needsMenuInformation GatheringPassword AttacksWireless TestingExploitation ToolsSniffing & SpoofingWeb HackingPrivate Web...
View ArticleBlueMaho v090417 - Bluetooth Security Testing Suite
BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for...
View ArticleCrips - IP Tools To quickly get information about IP Address's, Web Pages and...
This Tools is a collection of online IP Tools that can be used to quickly get information about IP Address's, Web Pages and DNS records.MenuWhois lookupTracerouteDNS LookupReverse DNS LookupGeoIP...
View ArticleLynis 2.5.8 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleRedLogin - SSH Brute-force Tools
Red Login: SSHBrute-force Tools.Features:High speed and precisionCLI ( Console based )Run the arbitrary command after the attack is successful ( Default 'Uname -a' )Telegram messanger support for...
View ArticleCloak - Backdoor In Any Python Script With Some Tricks
Cloak is an intelligent python backdoor framework.What it exactly does?Cloak generates a python payload via msfvenom and then intelligently injects it into the python script you specify.To evade basic...
View ArticleWordPress Exploit Framework v1.8 - A Ruby Framework For Developing And Using...
A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.What do I need to run it?Ensure that you have Ruby >= 2.4.2 installed...
View ArticleLaZagne v2.3 - Credentials Recovery Project
The LaZagne project is an open source application used to retrieve lots of passwords stored on a local computer. Each software stores its passwords using different techniques (plaintext, APIs, custom...
View ArticleADRecon - Tool Which Gathers Information About The Active Directory
ADRecon is a tool which extracts various artifacts (as highlighted below) out of an AD environment in a specially formatted Microsoft Excel report that includes summary views with metrics to facilitate...
View Articleuncaptcha - Defeating Google's audio reCaptcha with 85% accuracy
Defeating Google's audio reCaptcha system with 85% accuracy. InspirationAcross the Internet, hundreds of thousands of sites rely on Google's reCaptcha system for defense against bots (in fact, Devpost...
View ArticleiOSRestrictionBruteForce - Crack iOS Restriction Passcodes with Python
This version of the application is written with Python programming language,which is used to crack the Restriction PassCode of iphone/ipad.Brute ForceGet the Base64 key and salt from the backup file in...
View Article