PowerForensics – PowerShell Digital Forensics
PowerForensics is a PowerShell digital forensics framework. It currently supports NTFS and is in the process of adding support for the ext4 file system. features are included : DD utility Boot Sector...
View ArticleRaptor WAF – Web Applicaiton to Train Attacks to Bypass
Raptor is an Open Source Tool, yout focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’t use regex or other common ways to block attacks, yes is...
View ArticleWeeman — A HTTP Server for Phishing
Weeman is a HTTP server for phishing in python. Weeman has support for most of the (biggest) websites. Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap). What you can do...
View ArticleWAF-FLE – Graphical ModSecurity Console Dashboard
WAF-FLE (Web Application Firewall: Fast Log and Event Console) is a OpenSourceModSecurity Console – which allows the modsecurity admin to store, view and search events sent by sensors. It uses a...
View ArticleRouterhunterBR 2.0 – Automated Tool for Testing in Vulnerable Routers
The RouterhunterBR is an automated security tool que finds vulnerabilities and performs tests on routers and vulnerable devices on the Internet. The RouterhunterBR was designed to run over the Internet...
View ArticleXray — Android Security Testing
X-Ray, developed by the security experts at Duo Security allows you to scan your Android device for security vulnerabilities that put your device at risk. X-Ray scans your Android device to determine...
View ArticlePyKeylogger A Pure-Python Keylogger For Linux
Definition: PyKeylogger is a pure-python keylogger for Linux that uses Xlib by which it can monitor the state of the keyboard. The main purpose is backup process and stealth keylogger too. It is...
View ArticleUEFITool — UEFI firmware image viewer and editor
UEFITool is a cross-platform C++/Qt program for parsing, extracting and modifying UEFI firmware images. It supports parsing of full BIOS images starting with the flash descriptor or any binary files...
View ArticleHackSys — Extreme Vulnerable Windows Driver
HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level. HackSys Extreme Vulnerable...
View ArticleARTDroid — Fool The Droid For Fun and Profit
ARTDroid is a framework which allows to analyze Android apps without modifications to both Android framework and apps. The core technology is the library injection and virtual methods hooking by vtable...
View ArticleWRAITH — Wireless Toolsuite
Wireless reconnaissance, collection and exploitation toolsuite Attack vectors, rogue devices, interfering networks are best visualized and identified over time. Current tools i.e. Kismet, Aircrack-ng...
View ArticleKitty — Python Fuzzing Framework
Kitty is an open-source modular and extensible fuzzing framework written in python, inspired by OpenRCE’sSulley and Michael Eddington’s (and now Deja Vu Security’s) Peach Fuzzer. Goal The goal of...
View ArticleSSLyze — Fast and Full Featured SSL Scanner
SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify...
View ArticleMITM Virtual Machine
MitM-VM is a Vagrant virtual machine that can be used as a transparent proxy. For those who have not used Vagrant, deploying the virtual machine is very straightforward and the virtual machine will be...
View ArticleHTTP MITM Proxy
HTTP Man In The Middle (MITM) Proxy written in node.js. Supports capturing and modifying the request and response data. Install npm install --save http-mitm-proxy Example This example will modify...
View ArticleArpy – Mac OSX Arp Spoof (MITM) Tool
Arpy is an easy-to-use ARP spoofing MiTM tool for Mac. It provides 3 targeted functions: Packet Sniffing Visited Domains Visited Domains with Gource Each function will be explained below. Tested OS (to...
View ArticleWhatportis — Command To Search Port Names And Numbers
It often happens that we need to find the default port number for a specific service, or what service is listening on a given port. Usage This tool allows you to find what port is associated with a...
View ArticleShellsploit — Shell Exploit Generation
Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. If you want to use Shellsploit, you have to...
View ArticleVBScan 0.1.4 – Black Box vBulletin Vulnerability Scanner
VBScan is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them. Why VBScan ? If you want to do a penetration test on a vBulletin Forum, VBScan is...
View ArticleGophish – Open-Source Phishing Framework
Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to...
View Article