Quantcast
Channel: KitPloit - PenTest Tools!
Browsing all 5816 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of...

A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 3200 malicious cryptocurrency mining domains (cryptojacking).Contributions are more than welcome!SummaryMinesweeper...

View Article


Image may be NSFW.
Clik here to view.

ICMPExfil - Exfiltrate data with ICMP

ICMP Exfil allows you to transmit data via valid ICMP packets. You use the client script to pass in data you wish to exfiltrate, then on the device you're transmitting to you run the server. Anyone...

View Article


Image may be NSFW.
Clik here to view.

LSB-Steganography - Python program to steganography files into images using...

Python program based on stegonographical methods to hide files in images using the Least Significant Bit technique.I used the most basic method which is the least significant bit. A colour pixel is...

View Article

Image may be NSFW.
Clik here to view.

IDAsec - IDA plugin for reverse-engineering and dynamic interactions with the...

IDA plugin for reverse-engineering and dynamic interactions with the Binsec platformFeaturesDecoding an instruction (in DBA IR)Loading execution traces generated by PinsecTriggering analyzes on Binsec...

View Article

Image may be NSFW.
Clik here to view.

DVWA - Damn Vulnerable Web Application

Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal...

View Article


Image may be NSFW.
Clik here to view.

Stacer - Linux System Optimizer and Monitoring

Linux System Optimizer And Monitoring.Required PackagescurlsystemdDebian x64Download stacer_1.0.8_amd64.deb from the Stacer releases page.Run sudo dpkg -i stacer*.deb on the downloaded package.Launch...

View Article

Image may be NSFW.
Clik here to view.

CFC - Linux Centralized Firewall Control

Centralized firewall control provides a centralized way to manage the firewall on multiple servers or loadbalancers running iptables. This way you can quickly allow/block/del/search abuse ranges etc....

View Article

Image may be NSFW.
Clik here to view.

AutoSploit - Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to...

View Article


Image may be NSFW.
Clik here to view.

LaZagneForensic - Decrypt Windows Credentials From Another Host

LaZagne uses an internal Windows API called CryptUnprotectData to decrypt user passwords. This API should be called on the victim user session, otherwise, it does not work. If the computer has not been...

View Article


Image may be NSFW.
Clik here to view.

Grouper - A PowerShell script for helping to find vulnerable settings in AD...

Grouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins) which sifts through the (usually very noisy) XML output from the...

View Article

Image may be NSFW.
Clik here to view.

Kali Linux 2018.1 Release - The Best Penetration Testing Distribution

Kali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the...

View Article

Image may be NSFW.
Clik here to view.

GasMask - Information Gathering Tool (OSINT)

All in one Information gathering tool - OSINTWritten by: maldevel (twitter)DependenciesPython 2.xvalidatorspython-whoisdnspythonrequestsInformation...

View Article

Image may be NSFW.
Clik here to view.

BLEAH - A BLE Scanner For "Smart" Devices Hacking

A BLE scanner for "smart" devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack. Explanatory post and screenshots can be found here.How to...

View Article


Image may be NSFW.
Clik here to view.

Meterpreter Paranoid Mode - Meterpreter over SSL/TLS connections

Meterpreter_Paranoid_Mode.sh allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to. We start by generating a...

View Article

Image may be NSFW.
Clik here to view.

roxysploit - Penetration Testing Suite

roxysploit is a community-supported, open-source and penetration testing suite that supports attacks for numerous scenarios. conducting attacks in the field.Some containing Plugins in roxysploitScan is...

View Article


Image may be NSFW.
Clik here to view.

LuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic

LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user:Full details and usage instructions can be found here.It's...

View Article

Image may be NSFW.
Clik here to view.

VENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener

The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ) injects the shellcode generated into one template (example: python) "the...

View Article


Image may be NSFW.
Clik here to view.

ID-entify - Search for information related to a domain (Emails, Domains,...

ID-entify is a tool that allows you to search for information in the passive way related to a domain. Developed By Carlos Ramírez López.SEARCH FOR INFORMATION RELATED TO A DOMAIN:EmailsIP...

View Article

Image may be NSFW.
Clik here to view.

TopHat - Fully undetected backdoor with RSA Encrypted shell

TopHat is a inspired by metasploits capabilties of meterpreter however i have coded a script to generate a undetected encrypted backdoor using python.Usage:python tophat.py <local host> <local...

View Article

Image may be NSFW.
Clik here to view.

Hate_Crack - Automated Hash Cracking Techniques with HashCat

A tool for automating cracking methodologies through Hashcat from the TrustedSec team. InstallationGet the latest hashcat binaries (https://hashcat.net/hashcat/)OSX Install...

View Article
Browsing all 5816 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>