email-hacking-tool : An elite hacking tool to crack into the email accounts...
You can completely own your victim once you have access to their e-mail account. This tool will hack their e-mail account so you can read their e-mail, pretend to be them, and even get access to their...
View ArticleProwl is an LinkedinCrawler.
LATEST CHANGE 11/6/2016 V1.5: + file.py ; End line Prowl is a Linkedin crawler that identifies corporate accounts and generates a list of potential email addresses. The main purpose of Prowl is to...
View ArticleMagic Unicorn Attack Vector v2.3.1
changelog v2.3.1: + unicorn.py; fix ident issue and take out long load times Unicorn is a PowerShell injection tool utilizing Matthew Graebers attack and expanded to automatically downgrade the process...
View ArticleCommix v1.1.0 – Automatic All-in-One OS Command Injection and Exploitation Tool.
Version 1.0 (2016-06-14): * Revised: Time-relative statistical analysis for recognition of unexpected time delays due to unstable requests. * Added: A list of pages / scripts potentially vulnerable to...
View Articlev0lt v1.5 – Security CTF Toy Tools.
Roadmap changelog v1.5: + Add InstructionCounter changelog v1.4: + ShellHack becomes ShellCrafter + Better ShellCrafter shellcode recovering + Add docstrings + Refactoring + Delete Hexeditor and...
View ArticlePNG-IDAT-chunks ~ payload generator.
Simple tool to generate malicious PNG images containing JavaScript code in IDAT chunks. Currently are supported only 3 characters domains. Description function: + Revisiting XSS payloads in PNG IDAT...
View Articlebackdoor-apk is a shell script that simplifies the process of adding a...
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool,...
View ArticleBinary x86 shellcode obfuscator and generator.
This is a WIP tool that performs shellcode obfuscation in x86 instruction set. Main reason for having a shellcode obfuscator is bypassing any static or run-time signature detections implemented by IDS...
View ArticleAutomated SQL Exploit in python.
ABSTRACT This project once deployed based on instructions provided in ReadMe, performs data extraction from vulnerable URL. It is a standalone python program which accept Command Line inputs like...
View ArticleuSploit framework v1.2 – very basic exploit/peneration test tool framework.
Changelog VERSION 1.2-alpha: + updated cloudflare_resolver module + updated network_scanner + added netifaces library + scapy library replaced to core/libs + updated readme + fixed bug from usploit...
View ArticleXdigger Framework is a Network Security Testing Assist Framework.
Xdigger Framework is a Network Security Testing Assist Framework. Requirements + Windows 7 or later. + .Net Framework 4.6 or later. Main Menu: + Home ; External Tools; netstat, ipconfig + Browser :...
View ArticleNishang v0.6.8 – PowerShell for penetration testing and offensive security.
changelog v0.6.8: + Added Out-SCF in the Client directory. The script generates a SCF file. The file (default name “SystemCatalog.scf”) needs to be put on a share. Whenever a user opens the file on the...
View ArticleThe Backdoor Factory (BDF) v3.4.0 – Patch PE, ELF, Mach-O binaries with...
Changelog v3.4.0 6/19/2016: + Added the preprocessor and other optimizations + The preprocessor allows the user to modify the binary prior to payload injection + Invoke with the -p flag + See samples...
View ArticlePowerOPS v0.9 – Powershell for Offensive Operations.
Changelog v0.9: + add @subTee AppLocker bypass + add Amsi bypass + Clean UP PowerOPS v0.9 PowerOPS is an application written in C# that does not rely on powershell.exe but runs PowerShell commands and...
View ArticleBluto v1.1.22 ~ DNS Recon | Brute Forcer | DNS Zone Transfers | Email...
Changelog v1.1.22 Full Featured: + setup.py and Bluto folder version Fix. Bluto v1.1.22 The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target...
View Articlesmplshllctrlr is an PHP Command Injection exploitation tool.
smplshllctrlr is an PHP Command Injection exploitation tool. + Exploit web page and upload simple-shell.php (or simply find an existing exploitable command injection). + Execute the controller to...
View ArticleProject Keyhole is A python framework to automatically backdoor binaries or...
Note: This Post for Education/Learning & Research Purpose Only! Project Keyhole is A python framework to automatically backdoor binaries or source code. Dependencies: + python (apt-get install...
View ArticleCommix v1.1 – Automatic All-in-One OS Command Injection and Exploitation Tool.
Changelog v1.1-git: + Added: Support for injections against ASP.NET applications. + Added: Support for warning detection regarding “create_function()” function. + Fixed: Minor improvent of the HTTP...
View ArticleBluto v1.99 – DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card...
Changelog Latest Version 1.99 (09/07/2016): + Email Hunter API Support Added. + Haveibeenpwned API Support Added. + HTML Evidence Report Added. + Modulated Code Base. + Local Error Logging. The target...
View ArticlePowerUpSQL: A PowerShell Toolkit for Attacking SQL Server.
The PowerUpSQL module includes functions to support common attack workflows against SQL Server on scale that can be used during internal penetration tests and red team engagements. I’ve also included...
View Article