DNSspider - Very Fast, Async Mulithreaded Subdomain Scanner
A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.CHANGELOG:v0.9use async multithreading via concurrent.futures moduleattack while mutating...
View ArticleReelPhish - A Real-Time Two-Factor Phishing Tool
ReelPhish simplifies the real-time phishing technique. The primary component of the phishing tool is designed to be run on the attacker’s system. It consists of a Python script that listens for data...
View ArticlePymap-Scanner - Python Scanner with GUI
Python-based port scanner with Pyqt4 user interface.FeaturesBasic GuiSpeed ScanCustom ServicesUser ControlError ControlUseful parametersAnd More.Installation Modules$ Pyqt4$...
View ArticleLynis 2.6.2 - Security Auditing Tool for Unix/Linux Systems
We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis. These changes are the next of simplification improvements we made....
View ArticleWhapa - WhatsApp DataBase Parser Tool
Whapa is a whatsapp database parser that automates the process. The main purpose of whapa is to present the data handled by the Sqlite database in a way that is comprehensible to the analyst. The...
View ArticleParat - Python Based Remote Administration Tool (RAT)
Parat is a simple remote administration tool (RAT) written in python.Also you can read wiki!Change log:Compatible with both python 2 and 3 versions(dont forget that may causes some error.so please...
View ArticleAPTSimulator - A toolset to make a system look as if it was the victim of an...
APT Simulator is a Windows Batch script that uses a set of tools and output files to make a system look as if it was compromised.Use CasesPOCs: Endpoint detection agents / compromise assessment...
View ArticleIntruderPayloads - A Collection Of Burpsuite Intruder Payloads, Fuzz Lists...
A collection of Burpsuite Intruder payloads and fuzz lists and pentesting methodology. To pull down all 3rd party repos, run install.sh in the same directory of the IntruderPayloads folder.Author:...
View ArticleAltdns - Generates permutations, alterations and mutations of subdomains and...
Altdns is a DNS recon tool that allows for the discovery of subdomains that conform to patterns. Altdns takes in words that could be present in subdomains under a domain (such as test, dev, staging) as...
View Articleezsploit - Linux Bash Script Automation For Metasploit
Command line script for automating metasploit functions: Checks for metasploit service and starts if not present Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android and Mac Start...
View ArticlesshLooter - Script To Steal Passwords From SSH
Script to steal passwords from SSH.Installgit clone https://github.com/mthbernardes/sshLooter.gitcd sshLooterConfigurationEdit the script on install.sh, and add your telegram bot api, and your...
View ArticlePcapXray - A Network Forensics Tool To visualize a Packet Capture offline as...
PcapXray is a Network Forensics Tool To visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication and file extraction.PcapXray Design...
View ArticleTunna - Set Of Tools Which Will Wrap And Tunnel Any TCP Communication Over HTTP
Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in fully firewalled environments.SUMMARYTLDR: Tunnels TCP connections...
View ArticleGobuster - Directory/File & DNS Busting Tool Written In Go
Gobuster is a tool used to brute-force:URIs (directories and files) in web sites.DNS subdomains (with wildcard support).Oh dear God.. WHY!?Because I wanted:... something that didn't have a fat Java GUI...
View ArticleDr. Mine - Tool To Aid Automatic Detection Of In-Browser Cryptojacking
Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking. The most accurate way to detect things that happen in a browser is via browser itself. Thus, Dr. Mine uses...
View ArticleDVHMA - Damn Vulnerable Hybrid Mobile App (For Android) That Intentionally...
Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities. Its purpose is to enable security professionals to test their tools and...
View ArticleMADLIRA - Malware detection using learning and information retrieval for Android
MADLIRA is a tool for Androidmalware detection. It consists in two components: TFIDF component and SVM learning component. In gerneral, it takes an input a set of malwares and benwares and then...
View ArticleFindsploit - Find Exploits In Local And Online Databases Instantly
Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes "copysploit" to copy any exploit-db exploit to the current...
View ArticleBlackWidow - A Python Based Web Application Scanner To Gather OSINT And Fuzz...
BlackWidow is a python based web application spider to gather subdomains, URL's, dynamic parameters, email addresses and phone numbers from a target website. This project also includes Inject-X fuzzer...
View ArticleOWASP DependencyCheck - A Software Composition Analysis Utility That Detects...
Dependency-Check is a utility that attempts to detect publicly disclosed vulnerabilities contained within project dependencies. It does this by determining if there is a Common Platform Enumeration...
View Article