Minesweeper - A Burpsuite plugin (BApp) to aid in the detection of...
A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 3200 malicious cryptocurrency mining domains (cryptojacking).Contributions are more than welcome!SummaryMinesweeper...
View ArticleICMPExfil - Exfiltrate data with ICMP
ICMP Exfil allows you to transmit data via valid ICMP packets. You use the client script to pass in data you wish to exfiltrate, then on the device you're transmitting to you run the server. Anyone...
View ArticleLSB-Steganography - Python program to steganography files into images using...
Python program based on stegonographical methods to hide files in images using the Least Significant Bit technique.I used the most basic method which is the least significant bit. A colour pixel is...
View ArticleIDAsec - IDA plugin for reverse-engineering and dynamic interactions with the...
IDA plugin for reverse-engineering and dynamic interactions with the Binsec platformFeaturesDecoding an instruction (in DBA IR)Loading execution traces generated by PinsecTriggering analyzes on Binsec...
View ArticleDVWA - Damn Vulnerable Web Application
Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for security professionals to test their skills and tools in a legal...
View ArticleStacer - Linux System Optimizer and Monitoring
Linux System Optimizer And Monitoring.Required PackagescurlsystemdDebian x64Download stacer_1.0.8_amd64.deb from the Stacer releases page.Run sudo dpkg -i stacer*.deb on the downloaded package.Launch...
View ArticleCFC - Linux Centralized Firewall Control
Centralized firewall control provides a centralized way to manage the firewall on multiple servers or loadbalancers running iptables. This way you can quickly allow/block/del/search abuse ranges etc....
View ArticleAutoSploit - Automated Mass Exploiter
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the Shodan.io API. The program allows the user to...
View ArticleLaZagneForensic - Decrypt Windows Credentials From Another Host
LaZagne uses an internal Windows API called CryptUnprotectData to decrypt user passwords. This API should be called on the victim user session, otherwise, it does not work. If the computer has not been...
View ArticleGrouper - A PowerShell script for helping to find vulnerable settings in AD...
Grouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins) which sifts through the (usually very noisy) XML output from the...
View ArticleKali Linux 2018.1 Release - The Best Penetration Testing Distribution
Kali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the...
View ArticleGasMask - Information Gathering Tool (OSINT)
All in one Information gathering tool - OSINTWritten by: maldevel (twitter)DependenciesPython 2.xvalidatorspython-whoisdnspythonrequestsInformation...
View ArticleBLEAH - A BLE Scanner For "Smart" Devices Hacking
A BLE scanner for "smart" devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack. Explanatory post and screenshots can be found here.How to...
View ArticleMeterpreter Paranoid Mode - Meterpreter over SSL/TLS connections
Meterpreter_Paranoid_Mode.sh allows users to secure your staged/stageless connection for Meterpreter by having it check the certificate of the handler it is connecting to. We start by generating a...
View Articleroxysploit - Penetration Testing Suite
roxysploit is a community-supported, open-source and penetration testing suite that supports attacks for numerous scenarios. conducting attacks in the field.Some containing Plugins in roxysploitScan is...
View ArticleLuLu - macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic
LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user:Full details and usage instructions can be found here.It's...
View ArticleVENOM 1.0.15 - Metasploit Shellcode Generator/Compiler/Listener
The script will use msfvenom (metasploit) to generate shellcode in diferent formats ( c | python | ruby | dll | msi | hta-psh ) injects the shellcode generated into one template (example: python) "the...
View ArticleID-entify - Search for information related to a domain (Emails, Domains,...
ID-entify is a tool that allows you to search for information in the passive way related to a domain. Developed By Carlos Ramírez López.SEARCH FOR INFORMATION RELATED TO A DOMAIN:EmailsIP...
View ArticleTopHat - Fully undetected backdoor with RSA Encrypted shell
TopHat is a inspired by metasploits capabilties of meterpreter however i have coded a script to generate a undetected encrypted backdoor using python.Usage:python tophat.py <local host> <local...
View ArticleHate_Crack - Automated Hash Cracking Techniques with HashCat
A tool for automating cracking methodologies through Hashcat from the TrustedSec team. InstallationGet the latest hashcat binaries (https://hashcat.net/hashcat/)OSX Install...
View Article