Automated script for Wifi Deauthentication Attack.
Intro Written in Python, sends deauth packets to a wifi network which results network outage for connected devices. Uses scapy module to send deauth packets and sniffs wifi. Know more about...
View ArticleUfonet v0.8 – U-Nation released.
[!]Remember: this tool is NOT for educational purpose. Usage of UFONet for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local,...
View ArticleBackdoorme – a powerful auto backdooring utilities.
LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remmember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleMARA v0.2.2 – is a Mobile Application Reverse engineering and Analysis...
Changelog Mara Framework version: 0.2.2 beta 8/12/2016: * Requirement at setup.sh update * Feature Update: + Domain Analysis +-+ Domain SSL scan via pyssltest and testssl +-+ Website fingerprinting via...
View Articlejammer – Jam Wifi Networks That Your Wireless Card Can Reach.
jammer is A Bash script to automate the continuous circular deauthentication of all the wifi networks in your reach. Keep in mind that it is generally illegal to use the script at your neihborhood, It...
View ArticleCloakify – Hide, Data Exfiltrating & Infiltration In Plain Sight.
CloakifyFactory is a menu-driven tool that leverages Cloakify Toolset scripts. When you choose to Cloakify a file, the scripts first Base64-encode the payload, then apply a cipher to generate a list of...
View Articlepypayload – Automatic Payload Generator.
Introduction Metasploit is a great suite for penetration testing. However, I tend to find it a hassle to create a payload utilizing Metasploit’s msfvenom, and created this project in order to automate...
View Articlewifiphiser v1.2 – Fast automated phishing attack against WPA networks.
Changelog wifiphisher v1.2: * -aI and –nojamming can be used in conjuction. * Web server now starts after DHCP [@sophron] * Support logging of multiple POST values [@sophron] * Include some ASCII art...
View ArticleiOS Security Audit Toolkit and Reverse Engineering – iOSSecAudit v2.0.
iOSSecAudit is python script for iOS App security auditing tools and iOS reverse engineering. With Function: + abr: application binary cookie reader. + ab: analyze binary and print result. + aca:...
View ArticleRuler v2.0 – A tool to abuse Exchange services.
Changelog ruler v2.0 12/12/2016: + Fix a bug that was causing rpc with –encrypt to fail for some mailboxes. Issue was with padding on the AUTH3 packet + Fix conflict Binaries version changelog + New...
View ArticlePyJFuzz – an automatic json fuzzer framework.
PyJFuzz is a small, extensible and ready-to-use framework used to fuzz JSON inputs, such as mobile endpoint REST API, JSON implementation, Browsers, cli executable and much more. The available...
View Articlemorpheus – automated TCP/UDP Hijacking tool.
LEGAL DISCLAMER: The author does not hold any responsibility for the bad use of this tool, remember that attacking targets without prior consent its illegal and punished by law. morpheus framework...
View Articleexploitpack v7.0 RoadHog – list your new exploit on Exploits Pack you will need.
Changelog ExploitPack RoadHog v7.0: * New Exploit: + XM Easy Personal FTP Server <= v5.30 Remote Format String Write4 Exploit + JS payload: Localhost-mZb7zr6L5z5T8xF.js * All Class Changes * Fixed...
View ArticleHijacker – Android GUI Application for wifi auditing tools.
Hijacker is a Graphical User Interface for the wireless auditing tools airodump-ng, aireplay-ng and mdk3. It offers a simple and easy UI to use these tools without typing commands in a console and...
View ArticleEyeWitness v2.2.1 – is a tool used to capture screenshots from a list of URLs.
Changelog EyeWitness v2.2.1: + Debian Install Updated: The Debian setup process has been updated to install the geckodriver. + Added in ability to specify max retries. + New XML, and bug fixes....
View ArticleInject shellcode into putty.
A task: * Select the executable file and the necessary tools. * To study the structure of the executable file. * Write implemented by the executable code in machine language. The structure of the...
View ArticleKatana Framework build v0067 – The hacking Framework.
Changelog KatanaFramework Core:0.0.0.1 Build:0067 21/12/16: + Added New Banner : Chapecoense commemoration + Added New Function : isPortLive, check port services. + Upgrading to Core:0.0.1.0 Build:0067...
View ArticleWiFi-Pumpkin v0.8.4 – Framework for Rogue Wi-Fi Access Point Attack.
Changelog WiFi-Pumpkin v0.8.4: + Features – added new plugin Pumpkin-Proxy (mitmproxy API) – added new notifications for donations + Fixes – fixed theme default QtableView Color hover WiFi-Pumpkin...
View ArticleSniffles – Traffic Generation for testing IDS & detecting suspicious behavior.
Sniffles is a tool for creating packet captures that will test IDS that use fixed patterns or regular expressions for detecting suspicious behavior. Sniffles works very simply. It takes a set of...
View ArticleBrosec v1.3.0 – An interactive reference tool to help security professionals...
Changelog Brosec v1.3.0 (Dec , 2016): * Enhancement – Added a new section (bros 6) for Brosec auxiliary modules (bros http, ftp, encode) – Added a command line interface for bros encode – Added MSF...
View Article