Mec - Mass Exploits Console
disclaimerplease use this tool only on authorized systems, im not responsible for any damage caused by users who ignore my warningi do not own the code of adapted exploits or toolsexploits are adapted...
View ArticleJudy Android Malware Infects Over 36.5 Million Google Play Store Users
Security researchers have claimed to have discovered possibly the largest malware campaign on Google Play Store that has already infected around 36.5 million Android devices with malicious ad-click...
View ArticleLinguistic Analysis Suggests WannaCry Hackers Could be From Southern China
It’s been almost four weeks since the outcry of WannaCry ransomware, but the hackers behind the self-spread ransomware threat have not been identified yet.However, two weeks ago researchers at Google,...
View ArticleTheFatRat v1.9 - massive exploiting tool [Updated]
Thefatrat a massive exploiting tool revealedAn easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and...
View ArticleWPSeku v0.2 - Wordpress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues.Screenshots Download and Usagegit clone...
View ArticleInjectProc - Process Injection Techniques
Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors.There are several techniques, which are commonly used: DLL injection, process...
View ArticleInjecting Metasploit Payloads into Android Applications
The process of injecting Metasploit payloads into Android applications can be done both manually and automatically. This post will examine the automated process. However if in an engagement time is not...
View ArticleRed on Red: The Attack Landscape of the Dark Web
We’ve frequently talked about how limited-access networks such as the Dark Web is home to various cybercriminal underground hotspots. Hosted and accessed via the Tor network, these sites house...
View ArticleWreckuests - yet another one hard-hitting tool to run DDoS atacks with...
What is this?Wreckuests is a script, which allows you to run DDoS attacks with HTTP-flood(GET/POST). It’s written in pure Python and uses proxy-servers as “bots”.⚠️ Warning: This script is published...
View ArticleCSAPP - Buffer Overflow Attacks / Bufbomb Lab
This assignment will help you develop a detailed understanding of IA-32 calling conventions and stack organization. It involves applying a series of buffer overflow attacks on an executable file...
View ArticleExplo - Human And Machine Readable Web Vulnerability Testing Format
explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of...
View ArticleMassBleed - SSL Vulnerability Scanner
USAGE:sh massbleed.sh [CIDR|IP] [single|port|subnet] [port] [proxy]ABOUT:This script has four main functions with the ability to proxy all connections:To mass scan any CIDR range for OpenSSL...
View ArticleCyphon - Incident Management and Response Platform
Collect, Filter, CreateCyphon ends the headaches that traditionally come with data management by streamlining all related processes through a single platform. Cyphon receives, processes, and triages...
View ArticleShogun - Shodan.io Command Line Interface
Shogun is a custom CLI for the Shodan.io search engine. The interface is designed to resemble a "shell" to the Shodan database. This way we can simply input commands to have the program perform various...
View ArticleT2B - Cross-Platform Post Exploitation Toolkit
This project aims to administrate a network of compromised hosts, keeping your identity private (thanks to Tor) and your connections secure (thanks to TLS/SSL). For many times botnets get stuck because...
View ArticleHowTo: Clear or Remove Last Login History in Linux
From the following article you will learn how to clear or remove the last login information on a Linux server from the command line.On the Linux systems there are three standard commands that show the...
View ArticleStinger-Tor Tor DoS tool
Stinger is a Python-2.7-coded Tor DoS tool with slow-GET and GET flood that can't be filtered by anti-DoS systems.Utilizes multi-threading with 256 threads default, and a thread capacity of 376. Waits...
View ArticlePython Multithreaded Tor
Did you ever want to be at two different places at the same time?When I asked myself this question, I actually started developing this solution in my mind.While performing penetration tests there are...
View ArticleBigBrainSecurity - a forensics scripts that will eventually turn into an IDS
BigBrainSecurity/cleanMFT.py filters master file tables and makes them more bearable to deal with. The primary use of the program is to import a text file made up of values separated by new lines that...
View ArticleBelati - The Traditional Swiss Army Knife For OSINT
Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose. This tools is inspired by Foca and Datasploit for OSINT What Belati can do?–...
View Article