Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

sdrtrunk - Tool For Decoding, Monitoring, Recording And Streaming Trunked...

A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using Software Defined Radios (SDR).Getting StartedUser's Manual Version...

View Article


Image may be NSFW.
Clik here to view.

DNSExfiltrator - Data exfiltration over DNS request covert channel

DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert channel.DNSExfiltrator...

View Article


Image may be NSFW.
Clik here to view.

RFCrack - A Software Defined Radio Attack Tool

RFCrack is my personal RF test bench, it was developed for testing RF communications between any physical device that communicates over sub Ghz frequencies. IoT devices, Cars, Alarm Systems etc......

View Article

Image may be NSFW.
Clik here to view.

OWASP-Nettacker - Automated Penetration Testing Framework

OWASP Nettacker project is created to automate information gathering, vulnerability scanning and eventually generating a report for networks, including services, bugs, vulnerabilities,...

View Article

Image may be NSFW.
Clik here to view.

Lynis 2.5.9 - Security Auditing Tool for Unix/Linux Systems

We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....

View Article


Image may be NSFW.
Clik here to view.

Cr3dOv3r v0.3 - Know The Dangers Of Credential Reuse Attacks

Your best friend in credential reuse attacks.Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) :Search for public leaks for the email and if it any, it returns with all...

View Article

Image may be NSFW.
Clik here to view.

GTScan - The Nmap Scanner for Telco

The Nmap Scanner for Telco. With the current focus on telecom security, there used tools in day to day IT side penetration testing should be extended to telecom as well. From here came the motivation...

View Article

Image may be NSFW.
Clik here to view.

One-Lin3r - Gives you one-liners that aids in penetration testing operations

One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit.It consists of various one-liners that aids in penetration testing operations:Reverser: Give it IP &...

View Article


Image may be NSFW.
Clik here to view.

gOSINT - Open Source Intelligence Framework

gOSINT is a small OSINT framework in golang, it's actually in development and still not ready for production if you want, feel free to contribute!What gOSINT can doFind mails from git repositoryFind...

View Article


Image may be NSFW.
Clik here to view.

EvilURL v2.0 - An Unicode Domain Phishing Generator for IDN Homograph Attack

Generate unicode evil domains for IDN Homograph Attack and detect them.PREREQUISITESpython 3.x for evilurl3.pyTESTED ON: Kali Linux - ROLLING EDITIONCLONEgit clone...

View Article

Image may be NSFW.
Clik here to view.

Vegile - Tool for Post exploitation Techniques in Linux

Vegile is a tool for Post exploitation Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of access and can potentially lead to deeper footholds into our targets...

View Article

Image may be NSFW.
Clik here to view.

OnionHarvester - A small TOR Onion Address harvester for checking if the...

A small TOR Onion Address harvester for checking if the address is available or not. The program uses the TOR local socks5 proxy for finding all the Onion Addresses which are alive and ports 80 and 443...

View Article

Image may be NSFW.
Clik here to view.

Hershell - Simple TCP reverse shell written in Go

Simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception.Supported OS...

View Article


Image may be NSFW.
Clik here to view.

Autorize - Automatic Authorization Enforcement Detection Extension For Burp...

Autorize is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by Barak Tawily, an application security expert, and Federico Dotta, a security expert at...

View Article

Image may be NSFW.
Clik here to view.

macro_pack - Tool Used To Automatize Obfuscation And Generation Of Ms Office...

The macro_pack is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like format. This tool can be used for redteaming, pentests, demos, and social...

View Article


Image may be NSFW.
Clik here to view.

SwishDbgExt - Incident Response & Digital Forensics Debugging Extension

SwishDbgExt is a Microsoft WinDbg debugging extension that expands the set of available commands by Microsoft WinDbg, but also fixes and improves existing commands. This extension has been developed by...

View Article

Image may be NSFW.
Clik here to view.

Ketshash - A little tool for detecting suspicious privileged NTLM...

A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs.The tool was published as part of the "Pass-The-Hash detection"...

View Article


Image may be NSFW.
Clik here to view.

SNMP-Brute - Fast SNMP brute force, enumeration, CISCO config downloader and...

SNMP brute force, enumeration, CISCO config downloader and password cracking script. Listens for any responses to the brute force community strings, effectively minimising wait...

View Article

Image may be NSFW.
Clik here to view.

FakeImageExploiter - Use a Fake image.jpg (hide known file extensions) to...

This module takes one existing image.jpg and one payload.ps1 (input by user) and builds a new payload (agent.jpg.exe) that if executed it will trigger the download of the 2 previous files stored into...

View Article

Image may be NSFW.
Clik here to view.

Enumdb - MySQL and MSSQL Brute Force And Post Exploitation Tool To Search...

Enumdb is brute force and post exploitation tool for MySQL and MSSQL databases. When provided a list of usernames and/or passwords, it will cycle through each looking for valid credentials.By default...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>