Trojanizer - Trojanize Your Payload (WinRAR [SFX] Automatization)
The Trojanizer tool uses WinRAR (SFX) to compress the two files input by user, and transforms it into an SFX executable(.exe) archive. The sfx archive when executed it will run both files (our payload...
View Articlerbndr - Simple DNS Rebinding Service
rbndr is a very simple, non-conforming, name server for testing software against DNS rebinding vulnerabilities. The server responds to queries by randomly selecting one of the addresses specified in...
View ArticlePupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote...
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) and post-exploitation tool mainly written in python. It features a all-in-memory...
View ArticleDomain Analyzer - Analyze The Security Of Any Domain By Finding All the...
Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.HowDomain analyzer...
View ArticleAl-Khaser v0.72 - Public malware techniques used in the wild (Virtual...
al-khaser is a PoC "malware" application with good intentions that aims to stress your anti-malware system. It performs a bunch of common malware tricks with the goal of seeing if you stay under the...
View ArticleWavecrack - Web Interface For Password Cracking With Hashcat
A user-friendly Web interface to share an hashcatcracking box among multiple users with some pre-defined options.ScreenshotsThe homepageAdding an hash to crack Seeing the results and some stats...
View ArticleWeb Shell Detector - PHP Script That Helps You Find And Identify PHP / CGI...
Web Shell Detector is a php script that helps you find and identify php/cgi(perl)/asp/aspx shells. Web Shell Detector has a “web shells” signature database that helps to identify “web shell” up to 99%....
View ArticleSQLmap Tamper-API - SQLMap Tamper API To Accept Tamper Scripts From All...
It's an API for SQLmap tamper scripts allows you to use your favorite programming language to write your tamper scripts.This API solves SQLmap limitation of accepting only python to write tamper...
View ArticleTwebit - Bitcoin Analysis in Twitter With Machine Learning
Bitcoin analysis with machine learning.How it works?1- Get tweets from twitter.2- Filter tweets.3- Tweet classification with naive bayes algorithm (Positive,negative and neut).Installationgit clone...
View ArticleInfoga - Email Information Gathering
Infoga is a tool for gathering e-mail accounts information (ip,hostname,country,...) from different public sources (search engines, pgp key servers). Is a really simple tool, but very effective for the...
View ArticleDEScrypt-CPU-Collision-Cracker - DEScrypt CPU Collision Cracker
A linux based high performance DEScrypt CPU cracker written in c++, it deduces the salt and uses a password list to crack hashes.Why not use a rainbow table?DEScrypt uses by default a two byte...
View ArticleInjectify - Perform Advanced MiTM Attacks On Websites With Ease
A modern BeEF inspired framework for the 21st century. Cross-platform clients => Web [in-browser] and Desktop [Electron]. Created from-scratch using pure NodeJS and Typescript.Getting started...
View ArticleNmap-Vulners - NSE Script Using Some Well-Known Service To Provide Info On...
NSE script based on Vulners.com API. NSE script using some well-known service to provide info on vulnerabilities.Dependencies: nmap libraries: http json stringThe only thing you should always keep in...
View ArticleLynis 2.6.1 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticlelanGhost - A LAN dropbox chatbot controllable via Telegram
A LAN dropbox chatbot controllable via TelegramInstallation: You will need a Raspberry Pi with fresh Raspbian/Kali on the SD card, because you don't want anything else running in the background.Boot up...
View ArticleSocialFish - Ultimate phishing tool with Ngrok integrated
Ultimate phishing tool with Ngrok integrated.PREREQUISITESPython 2.7Wget from PythonPHPTESTED ONKali Linux - ROLLING EDITIONCLONEgit clone https://github.com/UndeadSec/SocialFish.gitRUNNINGcd...
View ArticleSocial Recon - Investigate The Online Presence And Footprint Of Someone
This application locates and compiles information about online personalities, given a username and/or email address. Use this to investigate your own online presence, summarize the digital footprint of...
View ArticlePiDense - Monitor Illegal Wireless Network Activities (Fake Access Points)
Monitor illegal wireless network activities.Similar SSID broadcastsSame SSID broadcastsCalculates unencrypted wireless networks densityWatches SSID broadcasts at the blacklist.Capabilities...
View ArticleRDPY - Remote Desktop Protocol in Twisted Python
RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client and server side). RDPY is built over the event driven network engine Twisted. RDPY support standard...
View ArticleEvilgrade - Modular Framework To Take Advantage Of Poor Upgrade...
Evilgrade is a modular framework that allows the user to take advantage of poor upgrade implementations by injecting fake updates. It comes with pre-made binaries (agents), a working default...
View Article