Maelstrom – Bash Script for WiFi Vector Attack.
wifi vector attack for kali nethunter With Options : 1. Perform EvilAP 2. Perform accespoint-soft 3. Perform accespoint-ssl 4. Perform accespoint-captive-portal 5. Perform urlsnarf 6. Perform driftnet...
View ArticleT2-PacketSpammer : is a wifi packet injection utility.
T2-PacketSpammer Is a packet injection utility for use with mac80211 drivers. To inject frames it uses a monitor interface and uses radiotap headers to tune the wireless device per package. For details...
View ArticleNME – Network Mapping and Enumeration Framework Released.
The Network Mapping and Enumeration (NME) framework is a collection of Powershell modules used to gather information about “assets” pertaining to a system environment. Assets currently supported...
View ArticleTHC Hydra – IPv6 attack toolkit v-2.8-dev.
CHANGELOG ========= NOTE: More tools exist, but are only handed out to specific people who develop ipv6 security/pentest tools themselves, or support the thc-ipv6 toolkit development. If this matches...
View ArticleUpdates wpscan v-2.8 : is a black box WordPress vulnerability scanner.
Changelog and Updates v-2.8, Released: 2015-06-22: New : + Warn the user to update his DB files + Added last db update to –version option (see #815) + Add db checksum to verbose logging during update +...
View ArticleUpdates Lfi freak – A unique automated LFi Exploiter with Bind/Reverse Shells.
Change and latest Updates 24/6/2015: Windows and Linux Revert “Revert “Binaries Added””. LFI Freak is A unique tool for exploiting local file inclusions using PHP Input, PHP Filter and Data URI...
View ArticleUpdates Veil-Evasion v-2.21.1 : is a tool designed to generate metasploit...
Released.: 2.21.1 [6.24.2015]: + Modified.: RPC server now accepts the pwnstaller and doesn’t crash. + Updated..: Hyperion was updated to version 1.2 Veil-Evasion is a tool designed to generate...
View Articletrojandroid – an android simple trojan app.
Notice : This post just For Education Purpose Only! the purpose: How to Infect and Inject trojan into APK File, and re-upload on your server or google play store using MiTM. This project was to make a...
View Articlecloudget v0.72 released – python script to bypass cloudflare from command line.
python script to bypass cloudflare from command line, with extensive scraping, link harvesting, and recursive directory downloading. built upon cfscrape module. python script to bypass cloudflare from...
View ArticleBacksniffer is a covert communication suite that allows communication between...
Backsniffer is a covert communication suite that allows communication between an attacker and a backdoor application on a target’s compromised machine. Backsniffer contains two modules: 1. Blackhat.py...
View Articleanother sql injector in perl.
another sql injector in perl. Support Mysql and MsSQL. Script :#!/usr/bin/perl use LWP::UserAgent; use HTTP::Request; sub help { system('cls'); system('title Another SQL InJeCtoR'); print...
View Articlepython-backdoor is a sniffing traffic backdoor with tcpdump and RCE.
python-backdoor is a sniffing traffic backdoor with tcpdump and RCE. + Backdoor server. Sniffs traffic with tcpdump and activates temote command execution if right port pattern is provided. The output...
View ArticleSpiderFoot v2.6.0 released; is an open source footprinting and intelligence...
SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target, which may be an IP address, domain name, hostname or...
View Articlenetool.sh V- 4.5.2 released : MitM PENTESTING OPENSOURCE T00LKIT.
Changelog v-4.5 .2: + UPGRADE => msfcli replaced by msfconsole + netool.sh => “added” file selection GUI -> zenity displays + priv8.sh => “added” MitM DLINK phishing -> capture routers...
View ArticleSimple Rootkit written in C.
Basic Knowledge : A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or areas of its software that would not otherwise be allowed (for example,...
View ArticleJoomla mass sqli exploiter.
[Mass Exploit] Joomla 3.2 – 3.44 SQL Injection. SCanner and exploiter for CVE-2015-7297, CVE-2015-7857, and CVE-2015-7858. Requirements : + Python version 3.4.x + A third party package – Requests There...
View ArticleEmpire v1.3 released : PowerShell post-exploitation agent.
Changelog v-1.3.0: + Moved Find-Fruit.ps1 source to ./data/module_source/recon/* + Output tweak for find_fruit, added ShowAll flag Empire v-1.3.0 Empire is a pure PowerShell post-exploitation agent...
View ArticleMCfly is an interactive program that spoofs MAC addresses in a given interval.
MCfly is an interactive tool for Linux that spoofs MAC addresses in a given interval. Script :import uuid, re, random, os, subprocess, time, threading, sys, string from colorama import init...
View ArticleBinary is a Sample codes for assembly, linker and attack.
Binary is a Sample codes for assembly, linker and attack demos Rule *.asm is NASM source code file *.s is GNU Assembly (i.e., GAS) source code file *.nasm.o is NASM object file *.gas.o is GAS object...
View ArticleTAP v1.1.1 released : is a remote penetration testing platform builder.
TAP is a remote penetration testing platform builder. For folks in the security industry, traveling often times becomes a burden and adds a ton of cost to the customer. TAP was designed to make the...
View Article