Quantcast
Channel: HACK4NET 🤖 Pentest Tools and News
Browsing all 541 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

DefenseMatrix - Full security solution for Linux Servers

DefenseMatrix helps individuals and organizations who use Linux to secure their servers on various dimentions automatically. It makes securing a Linux server faster and easier.Never before have a...

View Article


Image may be NSFW.
Clik here to view.

Pharos - Automated static analysis tools for binary programs

The Pharos static binary analysis framework is a project of the Software Engineering Institute at Carnegie Mellon University. The framework is designed to facilitate the automated analysis of binary...

View Article


Image may be NSFW.
Clik here to view.

outis - custom Remote Administration Tool

outis is a custom Remote Administration Tool (RAT) or something like that. Think Meterpreter or Empire-Agent. However, the focus of this tool is neither an exploit toolkit (there are no exploits) nor...

View Article

Image may be NSFW.
Clik here to view.

HackSys Extreme Vulnerable Driver

HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level.HackSys Extreme Vulnerable...

View Article

Image may be NSFW.
Clik here to view.

Metasploit In Termux

TERMUXTermux is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are...

View Article


Image may be NSFW.
Clik here to view.

Intrigue-core - Framework for automated attack surface discovery

Intrigue makes it easy to discover information about attack surface connected to the Internet. Intrigue utilizes common sources of OSINT via “tasks” to create “entities”. Each discovered entity can be...

View Article

Image may be NSFW.
Clik here to view.

dcrawl - Multi-threaded Web Crawler

dcrawl is a simple, but smart, multi-threaded web crawler for randomly gathering huge lists of unique domain names.dcrawl takes one site URL as input and detects all <a href=...> links in the...

View Article

Image may be NSFW.
Clik here to view.

OWASP ZSC - Shellcode/Obfuscate Code Generator

OWASP ZSC is an open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX under...

View Article


Image may be NSFW.
Clik here to view.

Seth - RDP Man in the Middle Attack Tool

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to extract clear text credentials. It was developed to raise awareness and educate...

View Article


Image may be NSFW.
Clik here to view.

AWSBucketDump - Security Tool to Look For Interesting Files in S3 Buckets

AWSBucketDump is a tool to quickly enumerate AWS S3 buckets to look for loot. It's similar to a subdomain bruteforcer but is made specifically for S3 buckets and also has some extra features that allow...

View Article

Image may be NSFW.
Clik here to view.

BitCracker - Bitlocker password cracker

BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a mono-GPU password cracking tool for memory units encrypted...

View Article

Image may be NSFW.
Clik here to view.

rVMI - A New Paradigm For Full System Analysis

rVMI is a debugger on steroids. It leverages Virtual Machine Introspection (VMI) and memory forensics to provide full system analysis. This means that an analyst can inspect userspace processes, kernel...

View Article

Image may be NSFW.
Clik here to view.

Hijacker - Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for...

Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commands in a...

View Article


Image may be NSFW.
Clik here to view.

Zeus-Scanner - Advanced dork searching utility

Zeus is a advanced dork searching tool that is capable of bypassing search engine API calls, search engine captchas, and IP address blocking from sending many requests to the search engine itself. Zeus...

View Article

Image may be NSFW.
Clik here to view.

flashlight - Automated Information Gathering Tool for Penetration Testers

Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather information rapidly on target networks. So Flashlight should be...

View Article


Image may be NSFW.
Clik here to view.

DefploreX - MACHINE-LEARNING TOOLKIT FOR LARGE-SCALE ECRIME FORENSICS

At BlackHat USA 2017's Arsenal we've showcased DefPloreX, an Elasticsearch-based toolkit that our team uses for large-scale processing, analysis and visualization of e-crime records. In particular,...

View Article

Image may be NSFW.
Clik here to view.

ProcInfo - Process info/monitoring library for macOS

Proc Info is a open-source, user-mode, library for macOS. It provides simple interface to retrieve detailed information about running processes, plus allows one to asynchronously monitor process...

View Article


Image may be NSFW.
Clik here to view.

LuLu - macOS firewall

LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user:Full details and usage instructions can be found here.To...

View Article

Image may be NSFW.
Clik here to view.

APT2 - An Automated Penetration Testing Toolkit

This tool will perform an NMap scan, or import the results of a scan from Nexpose, Nessus, or NMap. The processesd results will be used to launch exploit and enumeration modules according to the...

View Article

Image may be NSFW.
Clik here to view.

ShinoBOT - RAT / Botnet Simulator for pentest / education

ShinoBOT, is a executable which is a RAT(Remote Access Trojan) simulator. You can remote-control your infected machine from the ShinoC2 (C&C server). You can execute any Windows commands,...

View Article
Browsing all 541 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>