net-creds - Sniff Sensitive Data From Interface or pcap
Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.SniffsURLs visitedPOST loads sentHTTP...
View ArticleBLEAH - BLE Scanner for Smart Devices Hacking
A BLE scanner for “smart” devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.How to InstallInstall bluepy from source:git clone...
View ArticleDNSExfiltrator - Data Exfiltration over DNS Request Covert Channel
DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert...
View ArticleTomb - Minimalistic CLI Tool to Manage Encrypted Volumes
Tomb is an 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Tomb is written in code that is easy to review and links commonly shared...
View ArticlePCILeech - Direct Memory Access Attack
The PCILeech use the USB3380 chip in order to read from and write to the memory of a target system. This is achieved by using DMA over PCI Express. No drivers are needed on the target system. The...
View ArticleSIMP - System Integrity Management Platform
The System Integrity Management Platform (SIMP) is an Open Source framework designed around the concept that individuals and organizations should not need to repeat the work of automating the...
View ArticleiWant - Decentralized Peer to Peer File Sharing
A command-line tool for searching and downloading files in LAN network, without any central server.FeaturesDecentralized : There is no central server hosting files. Therefore, no central point of...
View ArticleSharpShooter - Payload Generation Framework
SharpShooter is a payload creation framework for the retrieval and execution of arbitrary CSharp source code. SharpShooter is capable of creating payloads in a variety of formats, including HTA, JS,...
View ArticleWireshark cheatsheet
Wireshark, whose old name is Ethereal; It is a program that can run in many operating systems such as Windows, Linux, MacOS or Solaris and can analyze all the traffic going to network cards connected...
View ArticleNSA Releases GHIDRA Source Code — Free Reverse Engineering Tool
NSA today finally released the complete source code for GHIDRA version 9.0.2 which is now available on its Github repository.GHIDRA is agency's home-grown classified software reverse engineering tool...
View ArticleDragonBlood – New Vulnerability in WPA3 Protocol Let Hackers To Steal WiFi...
Security researchers discovered a new vulnerability in WPA3 Protocol named as “Dragonblood” allows hackers to steal the WiFi Password from WP3 enabled WiFi Network.This serious vulnerability in WPA3...
View ArticleAPF - Advanced Policy Firewall
Advanced Policy Firewall (APF) is an iptables(netfilter) based firewall system designed around the essential needs of today’s Internet deployed servers and the unique needs of custom deployed Linux...
View ArticleLFISuite - Totally Automatic LFI Exploiter & Scanner
Totally Automatic LFI Exploiter & Scanner LFI Suite is a totally automatic tool able to scan and exploit Local File Inclusion vulnerabilities using many different methods of...
View ArticleDbDat - Database Assessment Tool
DbDat performs numerous checks on a database to evaluate security. The categories of checks performed are configuration, privileges, users, and information. Checks are performed by running queries...
View ArticleFast internet-wide scanner - Nscan
Nscan: Fast internet-wide scanner Nscan is a fast Network scanner optimized for internet-wide scanning purposes and inspired by Masscan and Zmap. It has it’s own tiny TCP/IP stack and uses Raw...
View ArticleThe Volatility Framework - Volatile Memory Extraction
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM)...
View ArticleminiLock - Drag-and-Drop Encryption
Drag-and-Drop Encryption miniLock The encryption project named minilock, is a free and open-source program plugin witch lets anybody encrypt and decrypt files in seconds utilizing drag-and-drop...
View ArticlePassGAN - A Deep Learning Approach for Password Guessing
State-of-the-art password guessing tools, such as HashCat and John the Ripper (JTR), enable users to check billions of passwords per second against password hashes. In addition to straightforward...
View ArticleControl IoT devices with thought power using Mindwave headset
What is Electroencephalography (EEG)What is Electroencephalography (EEG)Electroencephalography (EEG) is an electrophysiological monitoring method to record electrical activity of the brain.Mindwave EEG...
View ArticleIntel also hacked, private info, sources and tools leaked
It might take a while until further things will be released, while my source makes sure they're safe. If you find password protected zips in the release the password is probably either "Intel123" or...
View ArticleMeet Spox Phishing Kit for carding
What is phishing kit?Phishing kits are generally kits provided by cyber-criminals to allow anyone with a little bit of IT knowledge to carry out a phishing attack. How did i discovered this?During a...
View ArticleFast, multi-platform web server with automatic HTTPS: Caddy
a projectEvery site on HTTPSCaddy is an extensible server platform that uses TLS by default.FeaturesEasy configuration with the CaddyfilePowerful configuration with its native JSON configDynamic...
View ArticleCertificate authority and access plane for SSH, Kubernetes, web applications,...
Read our Blog: https://goteleport.com/blog/Read our Documentation: https://goteleport.com/docs/getting-started/Table of ContentsIntroductionInstalling and RunningDockerBuilding TeleportWhy did We Build...
View ArticleFree cross-platform password manager compatible with KeePass: Keeweb
Free cross-platform password manager compatible with KeePassThis webapp is a browser and desktop password manager compatible with KeePass databases. It doesn't require any server or additional...
View ArticleA list of useful payloads and bypass for Web Application Security and...
Payloads All The Things A list of useful payloads and bypasses for Web Application Security. Feel free to improve with your payloads and techniques !Every section contains the following files, you can...
View Article