Quantcast
Channel: Hacking Tools – DigitalMunition
Browsing all 236 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux

We have compiled this list of top hacking tools of 2016 with their best features and download links. Read about them, learn how to use them and share your reviews to make this list better. Disclaimer:...

View Article


Image may be NSFW.
Clik here to view.

Infinit — Decentralized Software‑Based File Storage Platform

The Infinit technology allows for the creation of heterogeneous storage infrastructure by aggregating various storage resources and unifying them into a UNIX-like Infinit file system. Infinit is...

View Article


YARA – Pattern Matching Tool For Malware Analysis

YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to...

View Article

Image may be NSFW.
Clik here to view.

The Social-Engineer Toolkit (SET) version 7.0

The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET  has quickly became a standard tool in a penetration testers arsenal. SET is...

View Article

NetworkMiner 2.0 – Network Forensic Analysis Tool (NFAT)

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order...

View Article


AutoNessus — Script To Communicate With Nessus API

AutoNessus is a script that communicates only with the Nessus API. The main goal is to help with automating scans. We can easily list all the scans, all policies, start, stop, pause, and resume a scan...

View Article

radare2 — Reverse Engineering Framework

Radare2 is an opensource, crossplatform reverse engineering framework. r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. Radare project...

View Article

SideDoor – Debian/Ubuntu Backdoor Using A Reverse SSH Tunnel

sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT. sidedoor is packaged for Debian-based systems with systemd or upstart. It has...

View Article


JSPrime — Light-Weight Source Code Scanner

JSPrime:A Light-Weight Source Code Scanner Introduction Today, many developers moved to JavaScript technology because of its simplicity, flexibility and as it is user-friendly. In recent days because...

View Article


CrackMapExecWin – The great CrackMapExec tool compiled for Windows

The great CrackMapExec tool compiled for Windows Features Latest 2.2 version Compiled for x86 so should work on x86 and x64 platforms   Advertisements Usage Download the whole archive Extract it and...

View Article

Image may be NSFW.
Clik here to view.

Damn Vulnerable Web Services

Damn Vulnerable Web Services is a vulnerable testing environment that can be used to learn real world web service vulnerabilities. The aim of this project is to aid security professionals in testing...

View Article

AWS Scout-2: A Security Tool For Accessing AWS Environment (Security Posture)

AWS Scout2 is an open-source security tool by which assessing of AWS environments security posture becomes very easy. AWS Scout2 gathers EC2, CloudTrail, RDS, S3 and IAM, configuration data by using...

View Article

Fingerping — Security Tool For Fingerprint PNG Files Of Web Applications

Fingerping: A Security Tool For Fingerprint PNG Files Of Web Applications When we audit web applications Fingerprinting is the most important step. The tool which is able to fingerprint the PNG files...

View Article


Image may be NSFW.
Clik here to view.

PyScan-Scanner – Vulnerability Scanner With Custom Payload

REQUIRE urllib2 BeautifulSoup requests Advertisements START Change database information $bdd = new PDO('mysql:host=localhost;dbname=pyscan', 'user', 'password'); Update a Python gate panel_url =...

View Article

Ruby-Nmap: Nmap Exploration Tool And Security/Port Scanner

Definition: It is a ruby version library of Nmap, the exploration tool and security/port scanner.   Features of ruby-nmap: ruby-nmap is written in easy-to-understand representation. When we want to...

View Article


Windows Exploitation Resources

A curated list of awesome Windows Exploitation resources.   Windows stack overflows Stack Base Overflow Articles. Win32 Buffer Overflows (Location, Exploitation and Prevention) – by Dark spyrit [1999]...

View Article

Image may be NSFW.
Clik here to view.

Foolav – Pentest Tool For Antivirus Evasion and Running Arbitrary Payload on...

Executable compiled with this code is useful during penetration tests where there is a need to execute some payload (meterpreter maybe?) while being certain that it will not be detected by antivirus...

View Article


Image may be NSFW.
Clik here to view.

Smod – MODBUS Penetration Testing Framework

smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. It is a full Modbus protocol implementation using Python and Scapy....

View Article

Image may be NSFW.
Clik here to view.

Website Fingerprinting on Tor — attacks and defenses

Tor project is know because of its anonymity, recently many researchers and the security agencies tried to find ways to get in the tor to find the suspected. These researches are going on; on Dec...

View Article

Image may be NSFW.
Clik here to view.

Software To Decrypt HydraCrypt And UmbreCrypt Ransomware Files

Software To Decrypt HydraCrypt And UmbreCrypt Ransomware Files This month the researcher team came to know about the two new malware families: HydraCrypt and UmbreCrypt. HydraCrypt and UmbreCrypt are...

View Article
Browsing all 236 articles
Browse latest View live