parameth - brute discover GET and POST parameters
Often when you are busting a directory for common files, you can identify scripts (for example test.php) that look like they need to be passed an unknown parameter. This hopefully can help find...
View ArticleHabu - Python Network Hacking Toolkit
Some techniques implemented in the current version are:ARP PoisoningARP SniffingDHCP DiscoverDHCP StarvationLAND AttackSNMP CrackingSYN FloodingTCP Flags AnalysisTCP ISN AnalysisTCP Port...
View ArticleMaryam - Scanning the Web application and networks
Using the Maryam Tool, you can start scanning the Web application and networks and easily complete the information gathering process.Features1. whois > Lookup information on a Domain or IP address2....
View ArticleTeleShadow - Frist Telegram Desktop Session Stealer [ Windows ]
Stealing desktop telegrams has never been so easy !Set the email and sender details of the sender and recipient and send it to the victim after compiling.How do I use the session file?Delete everything...
View ArticleDisqus Hacked: More than 17.5 Million Users' Details Stolen in 2012 Breach
Another day, Another data breach disclosure.This time the popular commenting system has fallen victim to a massive security breach.Disqus, the company which provides a web-based comment plugin for...
View ArticleDNSDiag - DNS Diagnostics and Performance Measurement Tools
Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior with your DNS responses? Ever been redirected to wrong address and suspected something is wrong with your...
View Articlefixer - FIX (Financial Information eXchange) protocol fuzzer
Fixer™ is a Python command-line tool which simplifies and enhances FIX security testing by delivering a more customisable and automated Fix fuzzing process.Requirements:Wireshark or TCPDumpFixer will...
View ArticleOS X Auditor - Mac OS X computer forensics tool
OS X Auditor is a free Mac OS X computer forensics tool.OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:the kernel extensionsthe...
View ArticleBlisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)
A slow data siphon for MySQL/MariaDB using bitwise operation on printable ASCII characters, via a blind-SQL injection.UsageUSAGE:blisqy.py --server <Web Server> --port <port> --header...
View ArticleVanquish - Enumeration Orchestrator
Vanquish is a Kali Linux based Enumeration Orchestrator built in Python. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases. The results...
View ArticleNzyme - Collects 802.11 management frames
Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a...
View ArticleTallow - Transparent Tor for Windows
Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. Tallow also...
View ArticleFruityC2 - Post-Exploitation Framework
This is the initial release for FruityC2 (alpha version). Can be installed on any linux system, but the installation scripts are made for Debian based systems. There are a lot of functionalities that...
View ArticleMacro Pack - automatize obfuscation and generation of MS Office documents
The macro_pack is a tool used to automatize obfuscation and generation of MS Office documents for pentest, demo, and social engineering assessments. The goal of macro_pack is to simplify antimalware...
View ArticleBreacher - An advanced multithreaded admin panel finder
A script to find admin login pages and EAR vulnerabilites.Features Multi-threading on demand Big path list (798 paths) Supports php, asp and html extensions Checks for potential EAR vulnerabilites...
View ArticleAUMFOR - Automated Memory Forensic
AUMFOR is Automated Memory Forensic is GUI based Tool for helping Forensic Investigator by performing all complex and tedious work automatically, it also analyzes and gives final accurate reports about...
View ArticleCameradar - Hacks its way into RTSP CCTV cameras
Cameradar allows you toDetect open RTSP hosts on any accessible target hostDetect which device model is streamingLaunch automated dictionary attacks to get their stream route (e.g.: /live.sdp)Launch...
View ArticleFireEye Labs Obfuscated String Solver - Automatically extract obfuscated...
Rather than heavily protecting backdoors with hardcore packers, many malware authors evade heuristic detections by obfuscating only key portions of an executable. Often, these portions are strings and...
View Articlepsad - Intrusion Detection and Log Analysis with iptables
The Port Scan Attack Detector psad is a lightweight system daemon written in is designed to work with Linux iptables/ip6tables/firewalld firewalling code to detect suspicious traffic such as port scans...
View ArticleA2SV - Auto Scanning to SSL Vulnerability
Auto Scanning to SSL Vulnerability.HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etcA. Support Vulnerability[CVE-2007-1858] Anonymous Cipher[CVE-2012-4929] CRIME(SPDY)[CVE-2014-0160] CCS...
View Article