needle v1.0.0 – The iOS Security Testing Framework.
Changelog needle v1.0.0: * Added – [AGENT] Released Needle Agent – [CORE] iOS 10 Support – [CORE] Overhaul of the Core – [CORE] Possibility to disable modules if running incompatible version of iOS –...
View ArticleInvoke-Obfuscation v1.7 – PowerShell command and script obfuscator.
Changelog Invoke-Obfuscation v1.7: + Added support for WindowStyle shorthand arguments: 0,n,no,nor,norm,norma 1,h,hi,hid,hidd,hidde 2,mi,min,mini,minim,minimi,minimiz,minimize...
View ArticleHatCloud – cloudflare bypass.
HatCloud build in Ruby. It makes bypass in CloudFlare for discover real IP. This can be useful if you need test your server and website. Testing your protection against Ddos (Denial of Service) or Dos....
View ArticleCansina is a Web Content Discovery Application.
Latest Changelog 13/3/2017: + added reaped entries from robots.txt + New option: -R autoscan robots.txt and use it as a payload + added vscode configuration directory Cansina is a web content discovery...
View Articleinquisitor – OSINT Gathering Tool for Companies and Organizations.
Inquisitor is a simple for gathering information on companies and organizations through the use of Open Source Intelligence (OSINT) sources. The key features of Inquisitor include: + The ability to...
View ArticleMercure is a tool for security managers who want to train their colleague to...
Mercure is a tool for security managers who want to teach their colleagues about phishing. What Mercure can do: * Create email templates * Create target lists * Create landing pages * Handle...
View ArticleSpiderFoot v2.9.0 – is an open source intelligence automation tool.
Changelog spiderfoot v2.9.0 New Modules / Data Sources: + This release introduces five new modules and an update to sfp_sharedip to include an additional data source: – sfp_cymon: Searches Cymon.io for...
View ArticleTheseus – a tool to pwn web sessions.
Theseus is a python2 script for Control A Victims Web Sessions. Dependencies: + Python 2.7.x + All Linux Operating System Support Theseus TODO: – Configure kernel and iptables for the attack: echo 1...
View ArticleSQL Nightmare – SQL SERVER Exploitation tools.
Disclaimer: + This software was written for educational purposes only. + Don’t use it on any site without prior permission of site owner. SQL Nightmare is An SQL SERVER Exploitation tool. Dependencies:...
View ArticleEaST v2.0 – Exploits and Security Tools Framework.
Changelog EaST v2.0: 1) Changed core messages communication 2) API available from every module 3) REQUEST/RESPONSE system via websockets for GUI 4) New OS shellcodes system. Now shellcodes can be...
View ArticleBAF – Blind Attacking Framework.
what is BAF ? – it’s a framework written in python [2.7] that is being made specially for blind attacking , ie : attacking random targets with common security issues , targets are generated by the...
View Articlepwdlyser – Password analysis & reporting tool.
The ‘pwdlyser‘ tool is a Python-based CLI script that automates the arduous process of manually reviewing cracked passwords during password audits following security assessments or penetration tests....
View ArticleSeth – Perform a MitM attack & extract clear text credentials from RDP...
Disclaimer: Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. Seth is a tool written in Python and Bash to MitM RDP connections. It attempts to...
View Articlenetattack – Python script to scan and attack wireless networks.
DISCLAIMER AND LICENSE: THE OWNER AND PRODUCER OF THIS SOFTWARE IS NOT LIABLE FOR ANY DAMAGE OR ANY LAW VIOLATIONS CAUSED BY THE SOFTWARE. The netattack.py is a python script that allows you to scan...
View ArticleDHCPig initiates an advanced DHCP exhaustion attack.
DISCLAIMER: All information and software available on this site are for educational purposes only. The author is no way responsible for any misuse of the information. DHCPig initiates an advanced DHCP...
View Articleccsiege – Security audit utility for PAN candidate generation.
ccsiege is provided to the community to help defend online merchant infrastructure. Please do not abuse it. Notes: The quality of the results are dependant on the quality of the *iin.txt* file....
View ArticleWPForce – WordPress Attack Suite.
WPForce is a suite of WordPress Attack tools. Currently this contains 2 modules – WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been...
View Articleshellcoder – Create shellcode from executable or assembly code.
shellcoder is a perl application which creates c source shellcodes starting from assembly sources or executables, it can create both windows and gnu/linux shellcodes and is compatible with both 32 and...
View ArticleFlorid – a ctf active scanner.
Florid is an python scripting for ctf active scanner. Dependencies: + Pyhon 2.7.x + All Operating System Support Florid – an active scanner. Notes: – After you scanned a website by this scanner, the...
View ArticleAutOSINT beta – is an open source intelligence gathering engagements.
Changelog AutOSINT beta version: + add db creation + All Modules successful test + fix db ref & fix init AutOSINT beta AutOSINT is a automate some common things checked during open source...
View Article