Best Hacking Tools Of 2016 For Windows, Mac OS X, And Linux
We have compiled this list of top hacking tools of 2016 with their best features and download links. Read about them, learn how to use them and share your reviews to make this list better. Disclaimer:...
View ArticleInfinit — Decentralized Software‑Based File Storage Platform
The Infinit technology allows for the creation of heterogeneous storage infrastructure by aggregating various storage resources and unifying them into a UNIX-like Infinit file system. Infinit is...
View ArticleYARA – Pattern Matching Tool For Malware Analysis
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to...
View ArticleThe Social-Engineer Toolkit (SET) version 7.0
The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element. SET has quickly became a standard tool in a penetration testers arsenal. SET is...
View ArticleNetworkMiner 2.0 – Network Forensic Analysis Tool (NFAT)
NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows (but also works in Linux / Mac OS X / FreeBSD). NetworkMiner can be used as a passive network sniffer/packet capturing tool in order...
View ArticleAutoNessus — Script To Communicate With Nessus API
AutoNessus is a script that communicates only with the Nessus API. The main goal is to help with automating scans. We can easily list all the scans, all policies, start, stop, pause, and resume a scan...
View Articleradare2 — Reverse Engineering Framework
Radare2 is an opensource, crossplatform reverse engineering framework. r2 is a rewrite from scratch of radare in order to provide a set of libraries and tools to work with binary files. Radare project...
View ArticleSideDoor – Debian/Ubuntu Backdoor Using A Reverse SSH Tunnel
sidedoor maintains a reverse tunnel to provide a backdoor. sidedoor can be used to remotely control a device behind a NAT. sidedoor is packaged for Debian-based systems with systemd or upstart. It has...
View ArticleJSPrime — Light-Weight Source Code Scanner
JSPrime:A Light-Weight Source Code Scanner Introduction Today, many developers moved to JavaScript technology because of its simplicity, flexibility and as it is user-friendly. In recent days because...
View ArticleCrackMapExecWin – The great CrackMapExec tool compiled for Windows
The great CrackMapExec tool compiled for Windows Features Latest 2.2 version Compiled for x86 so should work on x86 and x64 platforms Advertisements Usage Download the whole archive Extract it and...
View ArticleDamn Vulnerable Web Services
Damn Vulnerable Web Services is a vulnerable testing environment that can be used to learn real world web service vulnerabilities. The aim of this project is to aid security professionals in testing...
View ArticleAWS Scout-2: A Security Tool For Accessing AWS Environment (Security Posture)
AWS Scout2 is an open-source security tool by which assessing of AWS environments security posture becomes very easy. AWS Scout2 gathers EC2, CloudTrail, RDS, S3 and IAM, configuration data by using...
View ArticleFingerping — Security Tool For Fingerprint PNG Files Of Web Applications
Fingerping: A Security Tool For Fingerprint PNG Files Of Web Applications When we audit web applications Fingerprinting is the most important step. The tool which is able to fingerprint the PNG files...
View ArticlePyScan-Scanner – Vulnerability Scanner With Custom Payload
REQUIRE urllib2 BeautifulSoup requests Advertisements START Change database information $bdd = new PDO('mysql:host=localhost;dbname=pyscan', 'user', 'password'); Update a Python gate panel_url =...
View ArticleRuby-Nmap: Nmap Exploration Tool And Security/Port Scanner
Definition: It is a ruby version library of Nmap, the exploration tool and security/port scanner. Features of ruby-nmap: ruby-nmap is written in easy-to-understand representation. When we want to...
View ArticleWindows Exploitation Resources
A curated list of awesome Windows Exploitation resources. Windows stack overflows Stack Base Overflow Articles. Win32 Buffer Overflows (Location, Exploitation and Prevention) – by Dark spyrit [1999]...
View ArticleFoolav – Pentest Tool For Antivirus Evasion and Running Arbitrary Payload on...
Executable compiled with this code is useful during penetration tests where there is a need to execute some payload (meterpreter maybe?) while being certain that it will not be detected by antivirus...
View ArticleSmod – MODBUS Penetration Testing Framework
smod is a modular framework with every kind of diagnostic and offensive feature you could need in order to pentest modbus protocol. It is a full Modbus protocol implementation using Python and Scapy....
View ArticleWebsite Fingerprinting on Tor — attacks and defenses
Tor project is know because of its anonymity, recently many researchers and the security agencies tried to find ways to get in the tor to find the suspected. These researches are going on; on Dec...
View ArticleSoftware To Decrypt HydraCrypt And UmbreCrypt Ransomware Files
Software To Decrypt HydraCrypt And UmbreCrypt Ransomware Files This month the researcher team came to know about the two new malware families: HydraCrypt and UmbreCrypt. HydraCrypt and UmbreCrypt are...
View Article