full screen background image
Search
Saturday 24 February 2018
  • :
  • :

Category: Tools

Findsploit – Find Exploits In Local And Online Databases Instantly

  Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also...

ezsploit – Linux Bash Script Automation For Metasploit

Command line script for automating metasploit functions: Checks for metasploit service and starts if not present Easily craft meterpreter...

MADLIRA – Malware detection using learning and information retrieval for Android

MADLIRA is a tool for Android malware detection. It consists in two components: TFIDF component and SVM learning component. In gerneral, it...

IntruderPayloads – A Collection Of Burpsuite Intruder Payloads, Fuzz Lists And File Uploads

A collection of Burpsuite Intruder payloads and fuzz lists and pentesting methodology. To pull down all 3rd party repos, run install.sh in...

Lynis 2.6.2 – Security Auditing Tool for Unix/Linux Systems

  We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis....

roxysploit – Penetration Testing Suite

  roxysploit is a community-supported, open-source and penetration testing suite that supports attacks for numerous scenarios....

BLEAH – A BLE Scanner For “Smart” Devices Hacking

A BLE scanner for “smart” devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead...

Kali Linux 2018.1 Release – The Best Penetration Testing Distribution

Kali Linux 2018.1 the first release of 2018, this fine release contains all updated packages and bug fixes since our 2017.3 release last...

Grouper – A PowerShell script for helping to find vulnerable settings in AD Group Policy

  Grouper is a slightly wobbly PowerShell module designed for pentesters and redteamers (although probably also useful for sysadmins)...

DVWA – Damn Vulnerable Web Application

  Damn Vulnerable Web Application (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goal is to be an aid for...

Minesweeper – A Burpsuite plugin (BApp) to aid in the detection of cryptocurrency mining domains (cryptojacking)

A Burpsuite plugin (BApp) to aid in the detection of scripts being loaded from over 3200 malicious cryptocurrency mining domains...

LuLu – macOS Firewall That Aims To Block Unauthorized (Outgoing) Network Traffic

LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the...

bettercap-ng – complete reimplementation of bettercap

bettercap-ng is a complete reimplementation of bettercap, the Swiss army knife for network attacks and monitoring. It is faster, stabler,...

Lynis 2.6.1 – Security Auditing Tool for Unix/Linux Systems

  We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis....

Nmap-Vulners – NSE Script Using Some Well-Known Service To Provide Info On Vulnerabilities

NSE script based on Vulners.com API. NSE script using some well-known service to provide info on vulnerabilities. Dependencies: nmap...

SQLmap Tamper-API – SQLMap Tamper API To Accept Tamper Scripts From All Languages

  It’s an API for SQLmap tamper scripts allows you to use your favorite programming language to write your tamper scripts. This...

Al-Khaser v0.72 – Public malware techniques used in the wild (Virtual Machine, Emulation, Debuggers, Sandbox detection)

al-khaser is a PoC “malware” application with good intentions that aims to stress your anti-malware system. It performs a bunch...

Domain Analyzer – Analyze The Security Of Any Domain By Finding All the Information Possible

  Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main...

Ketshash – A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs

A little tool for detecting suspicious privileged NTLM connections, in particular Pass-The-Hash attack, based on event viewer logs. The...

Universal Radio Hacker v1.9.2 releases: investigate wireless protocols like a boss

The Universal Radio Hacker is a software for investigating unknown wireless protocols. Features include hardware interfaces for common...

Vegile – Tool for Post exploitation Techniques in Linux

  Vegile is a tool for Post exploitation Techniques in linux. Post Exploitation techniques will ensure that we maintain some level of...

macro_pack – Tool Used To Automatize Obfuscation And Generation Of Ms Office Documents For Pentest, Demo, And Social Engineering Assessments

  The macro_pack is a tool used to automatize obfuscation and generation of retro formats such as MS Office documents or VBS like...

Autorize – Automatic Authorization Enforcement Detection Extension For Burp Suite

  Autorize is an automatic authorization enforcement detection extension for Burp Suite. It was written in Python by Barak Tawily, an...

SourceCodeSniffer: static code analysis tool for finding Injection, LFI/RFI, file uploads

SourceCodeSniffer The Source Code Sniffer is a poor man’s static code analysis tool (SCA) based on regular expressions. The Source Code...

yawast: YAWAST Antecedent Web Application Security Toolkit

The YAWAST Antecedent Web Application Security Toolkit YAWAST is an application meant to simplify initial analysis and information...

One-Lin3r – Gives you one-liners that aids in penetration testing operations

One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit. It consists of various one-liners that...

GTScan – The Nmap Scanner for Telco

  The Nmap Scanner for Telco. With the current focus on telecom security, there used tools in day to day IT side penetration testing...

Lynis 2.5.9 – Security Auditing Tool for Unix/Linux Systems

  We are excited to announce this major release of auditing tool Lynis. Several big changes have been made to core functions of Lynis....

sdrtrunk – Tool For Decoding, Monitoring, Recording And Streaming Trunked Mobile And Related Radio Protocols Using Software Defined Radios (SDR)

A cross-platform java application for decoding, monitoring, recording and streaming trunked mobile and related radio protocols using...

sqli-hunter: simple sqlmap api wrapper and proxy server

SQLi-Hunter SQLi-Hunter is a simple HTTP proxy server and a sqlmap api wrapper that makes dig SQLi easily. Installation Requirement Ruby:...