Protocol-Analyzer : Fuzz testing framework for network protocols.
Protocol Analyzer is an Fuzz testing framework for network protocols. The main purposes of the framework: – Verification of the operation of proprietary network protocols in accordance with the...
View Articlemegplus – Automated reconnaissance wrapper.
megplus wrapper will automate numerous tasks and help you during your reconnaissance process. The script finds common issues, low hanging fruit, and assists you when approaching a target. meg+ also...
View ArticleSpiderSploit Framework Is a open source and free project for penetration...
SpiderSploit Framework Is a open source and free project for penetration testing. The feature of this tool is simple access to Exploits and Tools For Security And Hacking Expert. This tool is...
View ArticlesRDI – Shellcode Reflective DLL Injector.
sRDI is a Shellcode implementation of Reflective DLL Injection. Convert DLLs to position independent shellcode. sRDI allows for the conversion of DLL files to position independent shellcode....
View ArticleMSDAT – Microsoft SQL(MsSQL) Database Attacking Tool.
LEGAL DISCLAMER! The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleAPTSimulator – A toolset to make a system look as if it was the victim of an...
Warning! This repo contains tools and executables that can harm your system’s integrity and stability. Do only use them on non-productive test or demo systems. APT Simulator is a Windows Batch script...
View Articlezzuf is a transparent application input fuzzer.
zzuf is a transparent application input fuzzer. Its purpose is to find bugs in applications by corrupting their user-contributed data (which more than often comes from untrusted sources on the...
View Articleroguehostapd – Hostapd wrapper for hostapd.
Roguehostapd is a fork of hostapd, the famous user space software access point. It provides Python ctypes bindings and a number of additional attack features. It was primarily developed for use in the...
View Articlebyebye – deauthentication users off of your local area network.
byebye is a penetration testing tool that enables an attacker to deauthenticate users off of their local area network. It relieson sending malformed ARP packets, resulting in an ARP spoof attack....
View Articlerogue – wireless/wifi penetration toolkit.
The Rogue Toolkit is an extensible toolkit aimed at providing penetration testers an easy-to-use platform to deploy software-defined Access Points (AP) for the purpose of conducting penetration testing...
View Articlewifite2 – automated wirelesss security auditor.
wifite2 a Python script for auditing wireless networks. What’s new? + Lots of files instead of “one big script”. + Cleaner process management — No longer leaves processes running in the background. +...
View ArticleKnocker – Endpoint Security Assessment Framework.
Knocker is an EndPoint Security Assessment Framework. User can create different types of executable files that will help to assess endpoints by trying different techniques to bypass endpoint...
View ArticlePasshunt is a simple tool for searching of default credentials for network...
Passhunt is a simple tool for searching of default credentials for router, network devices, web applications and more. Search through 523 vendors and their 2084 default passwords Dependencies: +...
View ArticleReconCat – A small Php application to fetch archive url snapshots from...
ReconCat is A small Php application to fetch archive url snapshots from archive.org. using it you can fetch complete list of snapshot urls of any year or complete list of all years possible. Made...
View Articlejhijack – A Java Hijacking tool for web application session security assessment.
DISCLAIMER: It was developed especially for OWASP WebGoat Session Hijacking Training Demonstration. YGN Ethical Hacker Group and author does not promote any illegal activities and will nor...
View ArticleODIN – A Python tool for automating intelligence gathering, testing and...
ODIN A Python tool for automating intelligence gathering, testing and reporting. ODIN is still in active development, so check the dev branch for the bleeding edge. Feedback is welcome! Note: ODIN is...
View ArticlegoGetBucket – AWS S3 Bucket discovery through alterations and permutations.
goGetBucket is A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain. When performing a recon on a domain – understanding assets they own is very important. AWS S3...
View ArticleTinfoleak – The most complete open-source tool for Twitter intelligence...
tinfoleak is an open-source tool within the OSINT (Open Source Intelligence) and SOCMINT (Social Media Intelligence) disciplines, that automates the extraction of information on Twitter and facilitates...
View Articlepspy – Monitoring linux processes without root permissions.
pspy is a command line tool designed to snoop on processes without needing root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of...
View ArticleInternal Monologue Attack: Retrieving NTLM Hash without Mimikatz.
Introduction Mimikatz, developed by Benjamin Delpy (@gentilkiwi), is a well-regarded post-exploitation tool, which allows adversaries to extract plain text passwords, NTLM hashes and Kerberos tickets...
View Article