Quantcast
Channel: Hacking Tools – DigitalMunition
Browsing all 236 articles
Browse latest View live

PowerForensics – PowerShell Digital Forensics

PowerForensics is a PowerShell digital forensics framework. It currently supports NTFS and is in the process of adding support for the ext4 file system. features are included : DD utility Boot Sector...

View Article


Image may be NSFW.
Clik here to view.

Raptor WAF – Web Applicaiton to Train Attacks to Bypass

Raptor is an Open Source Tool, yout focus is study of attacks and find intelligent ways to block attacks. Raptor is made in pure C, don’t use regex or other common ways to block attacks, yes is...

View Article


Image may be NSFW.
Clik here to view.

Weeman — A HTTP Server for Phishing

Weeman is a HTTP server for phishing in python. Weeman has support for most of the (biggest) websites. Usually you will want run Weeman with DNS spoof attack. (see dsniff, ettercap). What you can do...

View Article

WAF-FLE – Graphical ModSecurity Console Dashboard

WAF-FLE (Web Application Firewall: Fast Log and Event Console) is a OpenSourceModSecurity Console – which allows the modsecurity admin to store, view and search events sent by sensors. It uses a...

View Article

Image may be NSFW.
Clik here to view.

RouterhunterBR 2.0 – Automated Tool for Testing in Vulnerable Routers

The RouterhunterBR is an automated security tool que finds vulnerabilities and performs tests on routers and vulnerable devices on the Internet. The RouterhunterBR was designed to run over the Internet...

View Article


Image may be NSFW.
Clik here to view.

Xray — Android Security Testing

X-Ray, developed by the security experts at Duo Security allows you to scan your Android device for security vulnerabilities that put your device at risk. X-Ray scans your Android device to determine...

View Article

PyKeylogger A Pure-Python Keylogger For Linux

Definition: PyKeylogger is a pure-python keylogger for Linux that uses Xlib by which it can monitor the state of the keyboard. The main purpose is backup process and stealth keylogger too. It is...

View Article

Image may be NSFW.
Clik here to view.

UEFITool — UEFI firmware image viewer and editor

UEFITool is a cross-platform C++/Qt program for parsing, extracting and modifying UEFI firmware images. It supports parsing of full BIOS images starting with the flash descriptor or any binary files...

View Article


Image may be NSFW.
Clik here to view.

HackSys — Extreme Vulnerable Windows Driver

HackSys Extreme Vulnerable Driver is intentionally vulnerable Windows driver developed for security enthusiasts to learn and polish their exploitation skills at Kernel level. HackSys Extreme Vulnerable...

View Article


Image may be NSFW.
Clik here to view.

ARTDroid — Fool The Droid For Fun and Profit

ARTDroid is a framework which allows to analyze Android apps without modifications to both Android framework and apps. The core technology is the library injection and virtual methods hooking by vtable...

View Article

Image may be NSFW.
Clik here to view.

WRAITH — Wireless Toolsuite

Wireless reconnaissance, collection and exploitation toolsuite Attack vectors, rogue devices, interfering networks are best visualized and identified over time. Current tools i.e. Kismet, Aircrack-ng...

View Article

Image may be NSFW.
Clik here to view.

Kitty — Python Fuzzing Framework

Kitty is an open-source modular and extensible fuzzing framework written in python, inspired by OpenRCE’sSulley and Michael Eddington’s (and now Deja Vu Security’s) Peach Fuzzer.   Goal The goal of...

View Article

SSLyze — Fast and Full Featured SSL Scanner

SSLyze is a Python tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify...

View Article


MITM Virtual Machine

MitM-VM is a Vagrant virtual machine that can be used as a transparent proxy. For those who have not used Vagrant, deploying the virtual machine is very straightforward and the virtual machine will be...

View Article

HTTP MITM Proxy

HTTP Man In The Middle (MITM) Proxy written in node.js. Supports capturing and modifying the request and response data.   Install npm install --save http-mitm-proxy   Example This example will modify...

View Article


Image may be NSFW.
Clik here to view.

Arpy – Mac OSX Arp Spoof (MITM) Tool

Arpy is an easy-to-use ARP spoofing MiTM tool for Mac. It provides 3 targeted functions: Packet Sniffing Visited Domains Visited Domains with Gource Each function will be explained below. Tested OS (to...

View Article

Whatportis — Command To Search Port Names And Numbers

It often happens that we need to find the default port number for a specific service, or what service is listening on a given port. Usage This tool allows you to find what port is associated with a...

View Article


Image may be NSFW.
Clik here to view.

Shellsploit — Shell Exploit Generation

Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. If you want to use Shellsploit, you have to...

View Article

VBScan 0.1.4 – Black Box vBulletin Vulnerability Scanner

VBScan is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analyses them. Why VBScan ? If you want to do a penetration test on a vBulletin Forum, VBScan is...

View Article

Gophish – Open-Source Phishing Framework

Gophish is a phishing framework that makes the simulation of real-world phishing attacks very straight forwards. The idea behind gophish is simple – make industry-grade phishing training available to...

View Article
Browsing all 236 articles
Browse latest View live