Quantcast
Channel: HACK4NET šŸ¤– Pentest Tools and News
Browsing all 541 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Cr3dOv3r - Know the dangers of credential reuse attacks

Your best friend in credential reuse attacks.Cr3dOv3r simply you give it an email then it does two simple jobs (but useful) :Search for public leaks for the email and if it any, it returns with all...

View Article


Image may be NSFW.
Clik here to view.

Macro Creator - PowerShell VBA macro for MS-Word

Invoke-MacroCreator is a powershell Cmdlet that allows for the creation of an MS-Word document embedding a VBA macro with various payload delivery and execution capabilities.DescriptionBasically the...

View Article


Image may be NSFW.
Clik here to view.

Droidefense - Advance Android Malware Analysis Framework

DroidefenseĀ (originally named atom:Ā analysisĀ throughĀ observationĀ machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that...

View Article

Image may be NSFW.
Clik here to view.

Merlin - HTTP/2 Command & Control server and agent

The quickest and easiest way to start using Merlin is download the pre-compiled binary files found in theĀ ReleasesĀ section. The files are compressed into 7z archives and are password protected to...

View Article

Image may be NSFW.
Clik here to view.

Archerysec - Vulnerability Assessment and Management

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. Archery uses popular opensource tools to perform...

View Article


Image may be NSFW.
Clik here to view.

RetDec - Retargetable machine-code decompiler based on LLVM

The decompiler is not limited to any particular target architecture, operating system, or executable file format:Supported file formats: ELF, PE, Mach-O, COFF, AR (archive), Intel HEX, and raw machine...

View Article

Image may be NSFW.
Clik here to view.

PiKarma - šŸ“”šŸ“šŸ Detects wireless network attacks performed by KARMA module

Working Principle for PiKarmaCollects all the packets from Wireless Network. (Probe Response)Analyses all the packets in real time.If PiKarma finds more than one SSID info from unique mac address in...

View Article

Image may be NSFW.
Clik here to view.

Cloak - Backdoor any python script with some tricks

CloakĀ generates a python payload viaĀ msfvenomĀ and then intelligently injects it into the python script you specify.To evade basic detection, Cloak breaks the payload into several parts and places it in...

View Article


Image may be NSFW.
Clik here to view.

BlueMaho Project - Bluetooth Security Testing Suite

BlueMaho is GUI-shell (interface) for suite of tools for testing security of bluetooth devices. It is freeware, opensource, written on python, uses wxPyhon. It can be used for testing BT-devices for...

View Article


Image may be NSFW.
Clik here to view.

QBDI - Dynamic Binary Instrumentation framework

QuarkslaB Dynamic binary Instrumentation (QBDI) is a modular, cross-platform and cross-architecture DBI framework. It aims to support Linux, macOS, Android, iOS and Windows operating systems running on...

View Article

Image may be NSFW.
Clik here to view.

ACE - Automated, Collection, and Enrichment Platform

The Automated Collection and Enrichment (ACE) platform is a suite of tools for threat hunters to collect data from many endpoints in a network and automatically enrich the data. The data is collected...

View Article

Image may be NSFW.
Clik here to view.

uncaptcha - Defeating Google's audio reCaptcha with 85% accuracy

Defeating Google's audio reCaptcha system with 85% accuracy.Ā Across the Internet, hundreds of thousands of sites rely on Google's reCaptcha system for defense against bots (in fact, Devpost uses...

View Article

Image may be NSFW.
Clik here to view.

Sublist3r - Fast subdomains enumeration tool for penetration testers

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting....

View Article


Image may be NSFW.
Clik here to view.

RedLogin - SSH Brute-Force Tools

Features:High speed and precisionCLI ( Console based )Run the arbitrary command after the attack is successful ( Default 'Uname -a' )Telegram messanger support for sending reports via bot...

View Article

Image may be NSFW.
Clik here to view.

Qubes OS - A reasonably secure operating system

Qubes OS is a security-oriented operating system (OS). The OS is the software that runs all the other programs on a computer. Some examples of popular OSes are Microsoft Windows, Mac OS X, Android, and...

View Article


Image may be NSFW.
Clik here to view.

Salamandra - Find spy microphones that use radio freq to transmit

Salamandra is a tool to detect andĀ locateĀ spy microphones in closed environments. It find microphones based on the strength of the signal sent by the microphone and the amount of noise and overlapped...

View Article

Image may be NSFW.
Clik here to view.

Instagram-Py - Simple Instagram brute force script written in python

Instagram-PyĀ is a simple python script to perform basicĀ brute forceĀ attack againstĀ InstagramĀ ,this script canĀ bypassĀ login limiting on wrong passwords , so basically it can testĀ infinite number of...

View Article


Image may be NSFW.
Clik here to view.

Decodify - It can detect and decode encoded strings, recursively

It can detect and decode encoded strings, recursively. Its currently in beta phase.Lets take this string :Ā teamultimate.inĀ and encode it with Hex, URL, Base64 and FromChar encoding, respectively.Now...

View Article

Image may be NSFW.
Clik here to view.

Scout2 - Security auditing tool for AWS environments

Scout2 is an open source tool that helps assessing the security posture of AWS environments. Using the AWS API, the Scout2 Python scripts fetch CloudTrail, EC2, IAM, RDS, and S3, configuration data....

View Article

Image may be NSFW.
Clik here to view.

CoffeeMiner - Collaborative (mitm) cryptocurrency mining pool in wifi networks

Collaborative (mitm) cryptocurrency mining pool in wifi networksConceptPerforms a MITM attack to all selected victimsInjects a js script in all the HTML pages requested by the victimsThe js script...

View Article
Browsing all 541 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>