Quantcast
Channel: Penetration Test – Security List Network™
Browsing all 1152 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Protocol-Analyzer : Fuzz testing framework for network protocols.

Protocol Analyzer is an Fuzz testing framework for network protocols. The main purposes of the framework: – Verification of the operation of proprietary network protocols in accordance with the...

View Article


Image may be NSFW.
Clik here to view.

megplus – Automated reconnaissance wrapper.

megplus wrapper will automate numerous tasks and help you during your reconnaissance process. The script finds common issues, low hanging fruit, and assists you when approaching a target. meg+ also...

View Article


Image may be NSFW.
Clik here to view.

SpiderSploit Framework Is a open source and free project for penetration...

SpiderSploit Framework Is a open source and free project for penetration testing. The feature of this tool is simple access to Exploits and Tools For Security And Hacking Expert. This tool is...

View Article

Image may be NSFW.
Clik here to view.

sRDI – Shellcode Reflective DLL Injector.

sRDI is a Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode. sRDI allows for the conversion of DLL files to position independent shellcode....

View Article

Image may be NSFW.
Clik here to view.

MSDAT – Microsoft SQL(MsSQL) Database Attacking Tool.

LEGAL DISCLAMER! The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...

View Article


Image may be NSFW.
Clik here to view.

APTSimulator – A toolset to make a system look as if it was the victim of an...

Warning! This repo contains tools and executables that can harm your system’s integrity and stability. Do only use them on non-productive test or demo systems. APT Simulator is a Windows Batch script...

View Article

Image may be NSFW.
Clik here to view.

zzuf is a transparent application input fuzzer.

zzuf is a transparent application input fuzzer. Its purpose is to find bugs in applications by corrupting their user-contributed data (which more than often comes from untrusted sources on the...

View Article

Image may be NSFW.
Clik here to view.

roguehostapd – Hostapd wrapper for hostapd.

Roguehostapd is a fork of hostapd, the famous user space software access point. It provides Python ctypes bindings and a number of additional attack features. It was primarily developed for use in the...

View Article


Image may be NSFW.
Clik here to view.

byebye – deauthentication users off of your local area network.

byebye is a penetration testing tool that enables an attacker to deauthenticate users off of their local area network. It relieson sending malformed ARP packets, resulting in an ARP spoof attack....

View Article


Image may be NSFW.
Clik here to view.

rogue – wireless/wifi penetration toolkit.

The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose of conducting penetration testing...

View Article

Image may be NSFW.
Clik here to view.

wifite2 – automated wirelesss security auditor.

wifite2 a Python script for auditing wireless networks. What’s new? + Lots of files instead of “one big script”. + Cleaner process management — No longer leaves processes running in the background. +...

View Article

Image may be NSFW.
Clik here to view.

Knocker – Endpoint Security Assessment Framework.

Knocker is an EndPoint Security Assessment Framework. User can create different types of executable files that will help to assess endpoints by trying different techniques to bypass endpoint...

View Article

Image may be NSFW.
Clik here to view.

Passhunt is a simple tool for searching of default credentials for network...

Passhunt is a simple tool for searching of default credentials for router, network devices, web applications and more. Search through 523 vendors and their 2084 default passwords Dependencies: +...

View Article


Image may be NSFW.
Clik here to view.

ReconCat – A small Php application to fetch archive url snapshots from...

ReconCat is A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made...

View Article

Image may be NSFW.
Clik here to view.

jhijack – A Java Hijacking tool for web application session security assessment.

DISCLAIMER: It was developed especially for OWASP WebGoat Session Hijacking Training Demonstration. YGN Ethical Hacker Group and author does not promote any illegal activities and will nor...

View Article


Image may be NSFW.
Clik here to view.

ODIN – A Python tool for automating intelligence gathering, testing and...

ODIN A Python tool for automating intelligence gathering, testing and reporting. ODIN is still in active development, so check the dev branch for the bleeding edge. Feedback is welcome! Note: ODIN is...

View Article

Image may be NSFW.
Clik here to view.

goGetBucket – AWS S3 Bucket discovery through alterations and permutations.

goGetBucket is A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain. When performing a recon on a domain – understanding assets they own is very important. AWS S3...

View Article


Image may be NSFW.
Clik here to view.

Tinfoleak – The most complete open-source tool for Twitter intelligence...

tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines, that automates the extraction of information on Twitter and facilitates...

View Article

Image may be NSFW.
Clik here to view.

pspy – Monitoring linux processes without root permissions.

pspy is a command line tool designed to snoop on processes without needing root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of...

View Article

Image may be NSFW.
Clik here to view.

Internal Monologue Attack: Retrieving NTLM Hash without Mimikatz.

Introduction Mimikatz, developed by Benjamin Delpy (@gentilkiwi), is a well-regarded post-exploitation tool, which allows adversaries to extract plain text passwords, NTLM hashes and Kerberos tickets...

View Article
Browsing all 1152 articles
Browse latest View live