WarChild – Denial of Service Testing Suite
Warchild is a denial of service testing suite made for analysing the strength of your website against different kinds of denial of service attacks you will be facing which are mainly organised by...
View Articlescanless – Public Port Scan Scrapper
Command-line utility for using websites that can perform port scans on your behalf. Useful for early stages of a penetration test or if you’d like to run a port scan on a host and have it not come from...
View ArticlePwntools – CTF Framework And Exploit Development Library
pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible. from...
View ArticleStatic Code Analyzer: PVS-Studio
PVS-Studio performs static code analysis and generates a report that helps a programmer find and fix bugs. PVS-Studio performs a wide range of code checks, it is also useful to search for misprints...
View ArticleGithub Dorks – Github Security Scanning Tool
Github search is quite a powerful and useful feature and can be used to search for sensitive data in repositories, this Github security scanning tool comes with a collection of Github dorks that can...
View ArticleSSH Man-In-The-Middle Penetration Testing Tool
A patch applied to the OpenSSH v7.5p1 source code causes it to act as a proxy between the victim and their intended SSH server; all plaintext passwords and sessions are logged to disk. Of course, the...
View ArticleXSS’OR – Hack with JavaScript
XSS’OR is a free online tool for hacking with JavaScript. It contains three major modules: 1. Encode/Decode The Encode/Decode module, including: front-end encryption and decryption; code compression,...
View ArticleRecover files encrypted by the WannaCry ransomware: wanakiwi
wanakiwi is based on wanadecrypt which makes possible for lucky users to : Recover the private user key in memory to save it as 00000000.dky Decrypt all of their files The primes extraction method is...
View ArticlePybelt – The Hackers Tool Belt
Pybelt is a Python-based hackers tool belt capable of cracking hashes without prior knowledge of the algorithm, scanning ports on a given host, searching for SQLi vulnerabilities in a given URL,...
View ArticleAirachnid Burp Extension – A Burp Extension to test applications for...
A Burp extension to test applications for vulnerability to the Web Cache Deception attack. Once the extension has been loaded, it can be accessed in the Target – Sitemap tab and right click on the...
View ArticleMeterpreter Session Proxy: Metasploit Aggregator
The Metasploit Aggregator is a proxy for Meterpreter sessions. Normally, Meterpreter sessions connect directly to a Metasploit listener. However, this has a few problems: Multiple users cannot easily...
View ArticleSn1per – Penetration Testing Automation Scanner
Sn1per is a penetration testing automation scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Features Automatically collects basic recon (ie. whois, ping,...
View ArticleBoopSuite A Wireless Sniffer Tool
This project is easier to use, identifies clients more quickly than airodump-ng, and displays less useless information. The developer said, “Don’t mistake me, aircrack is an amazing suite of tools and...
View ArticleAnti-DDoS Solution Based on iptables: nShield
Requirements Linux System with python, iptables Nginx (Will be installed automatically by install.sh) Quickstart cd /home/ && git clone https://github.com/fnzv/nShield.git && bash...
View ArticlePhishingKitHunter – Find Phishing Kits Which Use Your Brand/Organization’S...
Find phishing kits which use your brand/organization’s files and image. PhishingKitHunter (or PKHunter) is a tool made for identifying phishing kits URLs used in phishing campains targeting your...
View ArticleQuickSand.io – Tool For Scanning Streams Within Office Documents Plus Xor DB...
QuickSand is a compact C framework to analyze suspected malware documents to 1) identify exploits in streams of different encodings, 2) locate and extract embedded executables. By having the ability to...
View ArticlemassExpConsole – Collection of Tools and Exploits with a CLI UI
Collection of Tools and Exploits with a CLI UI What does it do? an easy-to-use user interface (cli) execute any adapted exploit with process-level concurrency crawler for baidu and zoomeye a simple...
View ArticleWMI Command Shell Wrapper: WMIcmd
When doing low impact investigations and other similar activities you may want to minimize what is written to disk / obvious. This tool allows us to execute commands via WMI and get information not...
View Articleexplo – Human And Machine Readable Web Vulnerability Testing Format
explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow, explo is able to exploit security issues without the need of...
View ArticleT50: Very Fast Network Packet Injector Tool
It is the fastest network packet injector. T50 Sukhoi PAK FA is a mixed as well as fastest network packet injector. Or you can say that it is a kind of a packet injection free which is generated by...
View Article