Quantcast
Channel: Hacking Tools – DigitalMunition
Browsing all 236 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

WarChild – Denial of Service Testing Suite

Warchild is a denial of service testing suite made for analysing the strength of your website against different kinds of denial of service attacks you will be facing which are mainly organised by...

View Article


Image may be NSFW.
Clik here to view.

scanless – Public Port Scan Scrapper

Command-line utility for using websites that can perform port scans on your behalf. Useful for early stages of a penetration test or if you’d like to run a port scan on a host and have it not come from...

View Article


Image may be NSFW.
Clik here to view.

Pwntools – CTF Framework And Exploit Development Library

pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible. from...

View Article

Image may be NSFW.
Clik here to view.

Static Code Analyzer: PVS-Studio

PVS-Studio performs static code analysis and generates a report that helps a programmer find and fix bugs. PVS-Studio performs a wide range of code checks, it is also useful to search for misprints...

View Article

Image may be NSFW.
Clik here to view.

Github Dorks – Github Security Scanning Tool

Github search is quite a powerful and useful feature and can be used to search for sensitive data in repositories, this Github security scanning tool comes with a collection of Github dorks that can...

View Article


Image may be NSFW.
Clik here to view.

SSH Man-In-The-Middle Penetration Testing Tool

A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the...

View Article

Image may be NSFW.
Clik here to view.

XSS’OR – Hack with JavaScript

XSS’OR is a free online tool for hacking with JavaScript. It contains three major modules: 1. Encode/Decode The Encode/Decode module, including: front-end encryption and decryption; code compression,...

View Article

Image may be NSFW.
Clik here to view.

Recover files encrypted by the WannaCry ransomware: wanakiwi

wanakiwi is based on wanadecrypt which makes possible for lucky users to : Recover the private user key in memory to save it as 00000000.dky Decrypt all of their files The primes extraction method is...

View Article


Image may be NSFW.
Clik here to view.

Pybelt – The Hackers Tool Belt

Pybelt is a Python-based hackers tool belt capable of cracking hashes without prior knowledge of the algorithm, scanning ports on a given host, searching for SQLi vulnerabilities in a given URL,...

View Article


Image may be NSFW.
Clik here to view.

Airachnid Burp Extension – A Burp Extension to test applications for...

A Burp extension to test applications for vulnerability to the Web Cache Deception attack. Once the extension has been loaded, it can be accessed in the Target – Sitemap tab and right click on the...

View Article

Image may be NSFW.
Clik here to view.

Meterpreter Session Proxy: Metasploit Aggregator

The Metasploit Aggregator is a proxy for Meterpreter sessions. Normally, Meterpreter sessions connect directly to a Metasploit listener. However, this has a few problems: Multiple users cannot easily...

View Article

Image may be NSFW.
Clik here to view.

Sn1per – Penetration Testing Automation Scanner

  Sn1per is a penetration testing automation scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Features Automatically collects basic recon (ie. whois, ping,...

View Article

Image may be NSFW.
Clik here to view.

BoopSuite A Wireless Sniffer Tool

This project is easier to use, identifies clients more quickly than airodump-ng, and displays less useless information. The developer said, “Don’t mistake me, aircrack is an amazing suite of tools and...

View Article


Image may be NSFW.
Clik here to view.

Anti-DDoS Solution Based on iptables: nShield

Requirements Linux System with python, iptables Nginx (Will be installed automatically by install.sh)   Quickstart cd /home/ && git clone https://github.com/fnzv/nShield.git && bash...

View Article

Image may be NSFW.
Clik here to view.

PhishingKitHunter – Find Phishing Kits Which Use Your Brand/Organization’S...

Find phishing kits which use your brand/organization’s files and image. PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campains targeting your...

View Article


Image may be NSFW.
Clik here to view.

QuickSand.io – Tool For Scanning Streams Within Office Documents Plus Xor DB...

QuickSand is a compact C framework to analyze suspected malware documents to 1) identify exploits in streams of different encodings, 2) locate and extract embedded executables. By having the ability to...

View Article

Image may be NSFW.
Clik here to view.

massExpConsole – Collection of Tools and Exploits with a CLI UI

Collection of Tools and Exploits with a CLI UI What does it do? an easy-to-use user interface (cli) execute any adapted exploit with process-level concurrency crawler for baidu and zoomeye a simple...

View Article


Image may be NSFW.
Clik here to view.

WMI Command Shell Wrapper: WMIcmd

When doing low impact investigations and other similar activities you may want to minimize what is written to disk / obvious. This tool allows us to execute commands via WMI and get information not...

View Article

Image may be NSFW.
Clik here to view.

explo – Human And Machine Readable Web Vulnerability Testing Format

explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of...

View Article

Image may be NSFW.
Clik here to view.

T50: Very Fast Network Packet Injector Tool

It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector. Or you can say that it is a kind of a packet injection free which is generated by...

View Article
Browsing all 236 articles
Browse latest View live