Cartero v10-9-15 : A robust Phishing Framework with a full featured CLI...
Change v-10.9.15 : + – smbrelayx.py support allowing remote shell attacks and replay attacks using new French Kiss Attack. Cartero is A robust Phishing Framework with a full featured CLI interface....
View ArticleOoze is a manager of Botnet and Phishing.
Ooze is a manager of Botnet and Phishing, have a simple web shell and simple Auth and ACL. To install: $ cp -rf /Ooze /var/www/html $ chmod 755 -R /var/www/html/Ooze $ chmod o+w...
View ArticleDenial-of-Service Attacks on Host-Based Generic Unpackers.
Note: This post just for Education And Analysis Only! Use at your own risk! Denial-of-Service Attacks on Host-Based Generic Unpackers. With the advance of packing techniques, a few generic and...
View ArticleConcept-Rootkit – A simple conceptual linux rootkit.
A simple conceptual linux rootkit. how it work: – Hide the module: + Option1: Overwrite “lsmod” + Option2: Delete module listing “rootkit” from modules. – Configure rootkit to be a client. + Will...
View ArticleFirefox Security ToolKit – A tool that transforms Firefox Browsers into a...
How? It downloads the most important extensions, and install it on your browser. The used extensions has been chosen by a survey among the information security community. Based on it’s results, Firefox...
View ArticleZ-Attack is a Z-Wave Packet Interception and Injection Tool.
Z-Attack is a Z-Wave Packet Interception and Injection Tool GPLv3. This program is compatible with Rfcat and the Texas Instrument development KIT (with UART bridge) Z-Attack is a Z-Wave Packet...
View ArticleOSCARf – OSCAR (Open Source Collection of OSINT data And Recon) Framework.
Latest change 11/4/2015; Minor fixes : + Adjusted the timing to 5 seconds for deleting DMs. Yea, it takes longer, but until twitter decides that you can make more queries, then you’ll have to suffer...
View ArticleUfonet v0.6 – Galactic Offensive released.
[!]Remember: this tool is NOT for educational purpose. Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local,...
View ArticleThe Penetration Testers Framework (PTF) v1.4.2 codename Tools-R-Us released.
Latest Change v1.4.2; + Multiple fixes and additions + change name of module + Add update all functionality The PenTesters Framework (PTF) is a Python script designed for Debian/Ubuntu/ArchLinux...
View ArticleSimpleEmail is a email recon tool that is fast and easy framework to build on.
SimplyEmail What is the simple email recon tool? This tool was based off the work of theHarvester and kind of a port of the functionality. This was just an expansion of what was used to build...
View Articleunpacker is a WinAppDbg script to automate malware unpacking.
unpacker is a WinAppDbg script to automate malware unpacking. Features : + Detects certain unpacking behaviour (but not all) — Determines original entry point —+Determines jump point to original entry...
View ArticlevBulletin 5.1.x – PreAuth 0day Remote Code Execution Exploit.
vBulletin 5.1.x – PreAuth 0day Remote Code Execution Exploit. Mass exploit v bulletin Requirements – Python 3.4.x , Requests, Colorama Tested on: – Windows 7/Vista/8.1/ Ubuntu 14.04, Kali 2.0 Script :#...
View ArticleSpiderFoot v2.6.1 released; is an open source footprinting and intelligence...
Changelog v-2.6.1 Bug fix; – This release addresses a JavaScript error Chrome users were seeing when viewing scan results. SpiderFoot is an open source intelligence automation tool. Its goal is to...
View ArticleOmronPLC-IO-Attacker – Forced set CIO data and Control Omron PLC CPU.
Attention !!! Do not run in real and online control system !!! This will lead to system downtime and abnormal !!! What is the PLC’s I / O? I / O that is input and output shorthand, PLC as a...
View ArticleBackdoor-pyc – Replace pyc files with malicious pyc files.
Backdoor-pyc – Replace pyc files with malicious pyc files. How it work: – It replace for .pyc files and injects itself into them. – If at any time the .py file is updated, the .pyc will be...
View ArticleTHC Hydra – IPv6 attack toolkit v-3.1-dev released.
Latest Change 10/11/2015 more helper bash scripts: * small reliability patches * added man page auto generator by Benjamin Kellermann! dos_mld6.sh and local_discovery.sh to local_discovery6.sh more...
View ArticleEmpire v1.3.3 released : PowerShell post-exploitation agent.
Changelog v-1.3.3: -All PowerUp modules now dynamically built from a single source file -PowerUp bug fixes -Added privesc/powerup/service_exe_restore, pulled logic from other modules -Added...
View ArticleNotSoSerial is a Java Agent designed as a mitigation effort against...
NotSoSerial is a Java Agent designed as a mitigation effort against deserialization attacks. Think of it as a “deserialization firewall”. It gives you complete control over which classes your...
View ArticleCS465BufferOverflow is a Buffer Overflow Attack script.
CS465BufferOverflow is a Buffer Overflow Attack script. File Lists: – call_shellcode.c : A program that creates a file containing code for launching shell. – exploit.c : A program that creates a file...
View ArticleBDFProxy (The Backdoor Factory Proxy) version-0.3.7 released.
For security professionals and researchers only. Changelog v0.3.7 : – removing dependencies on python_magic and libmagic BDFProxy v0.3.7 This script rides on two libraries for usage: The Backdoor...
View Article