Remot3d - An Easy Way To Exploiting
It's easy to create a backdoor in an instant, the backdoor can be used in a remote process via a Linux terminal on the server that runs the PHP Language program.Made to bypass the system that is...
View ArticleMalice - Free open source version of VirusTotal
Malice's mission is to be a free open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500 company.Install$ brew install...
View ArticleAutosploit - Automated Mass Exploiter
As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets are collected automatically as well by employing the either the Shodan, Censys, ZoomEye, or all of...
View ArticleShoot - A Testing Environment for Manual Security Testers
Sh00tis a task manager to let you focus on performing security testingprovides To Do checklists of test caseshelps to create bug reports with customizable bug templatesFeatures:Dynamic Task Manager to...
View ArticleJok3r - Network and Web Pentest Framework
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.Its main goal is to save time on everything that can be...
View ArticleCIRTKit - Tools for the Computer Incident Response Team
CIRTKit is not just a collection of tools, but also a framework to aid in the ongoing unification of Incident Response and Forensics investigation processes.InvestigationsInvestigations are the core of...
View ArticleModlishka - Flexible and Powerful Reverse Proxy
Modlishka is a flexible and powerful reverse proxy, that will take your phishing campaigns to the next level.It was realeased with an aim to:help penetration testers to carry out an effective phishing...
View ArticleTAP - TrustedSec Attack Platform
TAP is a remote penetration testing platform builder. For folks in the security industry, traveling often times becomes a burden and adds a ton of cost to the customer. TAP was designed to make the...
View ArticlePsrecon - PowerShell Incident Response
Psrecon is an open source script that you can use to gather data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell...
View ArticleTrevorC2 - Command and Control via Legitimate Behavior over HTTP
TrevorC2 is a client/server model for masking command and control through a normally browsable website. Detection becomes much harder as time intervals are different and does not use POST requests...
View ArticleAbout a billion records with emails and passwords leaked
Totally 87GB data – Find out if you are affected by the massive data breach.Security researcher and founder of Have I Been Pwned, Troy Hunt, has revealed that around 773 million ‘unique’ email IDs and...
View ArticlePuma Scan - Visual Studio Security Extension
Visual Studio Security Extension Puma Scan is the leading software security Visual Studio analyzer extension. Built on top of Roslyn, the open-source .NET Compiler Platform, Puma Scan provides...
View Articlephishery - SSL Enabled Basic Auth Credential Harvester
An SSL Enabled Basic Auth Credential Harvesterwith a Word Document Template URL Injector Phishery is a Simple SSL Enabled HTTP server with the primary purpose of phishing credentials via Basic...
View ArticleSelfie stealing malware found in popular Android beauty camera apps
Google play Store flooding the several malicious beauty camera apps that steal Android users sensitive images and apps, the malicious app was already downloaded by more than 4 million Android...
View ArticleROCK NSM - Response Operation Collection Kit
MOCYBER’s open source Network Security Monitoring platform ROCK is a collections platform, in the spirit of Network Security Monitoring, designed by members of the Missouri National Guard’s Cyber...
View Articlenet-creds - Sniff Sensitive Data From Interface or pcap
Thoroughly sniff passwords and hashes from an interface or pcap file. Concatenates fragmented packets and does not rely on ports for service identification.SniffsURLs visitedPOST loads sentHTTP...
View ArticleRansomware - Windows Crypto Ransomware in Go
Windows Crypto Ransomware in Go Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless...
View ArticleBLEAH - BLE Scanner for Smart Devices Hacking
A BLE scanner for “smart” devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead easy to hack.How to InstallInstall bluepy from source:git clone...
View ArticleDNSExfiltrator - Data Exfiltration over DNS Request Covert Channel
DNSExfiltrator allows for transfering (exfiltrate) a file over a DNS request covert channel. This is basically a data leak testing tool allowing to exfiltrate data over a covert...
View ArticleTomb - Minimalistic CLI Tool to Manage Encrypted Volumes
Tomb is an 100% free and open source system for file encryption on GNU/Linux, facilitating the backup of secret files. Tomb is written in code that is easy to review and links commonly shared...
View Article