WPSeku v0.2 – WordPress Security Scanner
WPSeku is a black box WordPress vulnerability scanner that can be used to scan remote WordPress installations to find security issues. Screenshots Download WPSeku The post WPSeku v0.2 – WordPress...
View ArticleNETATTACK 2 Advanced Wireless Network Scan and Attack Tool
An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack. NETATTACK 2 is a python script that scans and attacks local and wireless networks. Everything is super easy...
View ArticleprobeSniffer – A Tool for Sniffing Unencrypted Wireless Probe Requests from...
____ ____ ___ ____ ___ _________ ____ _____ _____ ___ ____ | \| \ / \| \ / _/ ___| \| | | |/ _| \ | o | D | | o )/ [( \_| _ || || __| __/ [_| D ) | _/| /| O | | _\__ | | || || |_ | |_| _| / | | | \| |...
View ArticleInfect Android Application With Meterpreter Payload: kwetza
Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target...
View Articlemaltrail – Malicious Traffic Detection System
Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV...
View ArticleInjectProc – Process Injection Techniques
Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors. There are several techniques, which are commonly used: DLL injection, process...
View ArticleportSpider – A Lightning Fast Multithreaded Network Scanner Framework With...
A lightning fast multithreaded network scanner framework with modules. modules: http – Scan for open HTTP ports, and get the the titles. mysql – Scan for open MySQL servers, and try to log in with the...
View ArticleAutomatic Firewall Rule Orchestator: assimilator
The first restful API to control all firewall brands. Configure any firewall with restful API calls, no more manual rule configuration. Centralize all your firewalls into one API. Multiplatform [ x ]...
View ArticleEtherApe – Graphical Network Monitor
EtherApe is a graphical network monitor for Unix modelled after etherman. Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links change in size with traffic....
View Articlekwetza – Python script to inject existing Android applications with a...
Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload. What does it do? Kwetza infects an existing Android application with either custom or default...
View ArticleQt and C++ GUI for radare2 reverse engineering framework: Iaito
Iaitō is not aimed at existing radare2 users, it is focused on those whose are not yet radare2 users because of the learning curve, they don’t like CLI applications or the difficulty/instability of...
View ArticleDomain Hunter – Checks Expired Domains, Bluecoat Categorization, And...
Domain name selection is an important aspect of preparation for penetration tests and especially Red Team engagements. Commonly, domains that were used previously for benign purposes and were properly...
View ArticleLazyDroid – Android Security Assessment Tool
Lazydroid is a tool written as a bash script to facilitate some aspects of an Android Security Assessment. Features It provides some common tasks such as: Set the debug flag of an application to true...
View Articlepymultitor – Python Multi Threaded Tor Proxy
Did you ever want to be at two different places at the same time? While performing penetration tests there are often problems caused by security devices that block the “attacking” IP. With a large...
View Articlecredmap – The Credential Mapper
Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to...
View ArticleBelati – The Traditional Swiss Army Knife for OSINT
Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose. This tools is inspired by Foca and Datasploit for OSINT. What Belati can do?...
View ArticleRED HAWK – All In One Tool For Information Gathering, SQL Vulnerability...
RED HAWK is An All In One Tool For Information Gathering, SQL Vulnerability Scannig and Crawling. Coded In PHP Features Of The Tool: Server detection Cloudflare detector robots scanner CMS Detector...
View ArticleAVET – AntiVirus Evasion Tool
AVET is an AntiVirus Evasion Tool, which was developed for making life easier for pentesters and for experimenting with antivirus evasion techniques. In version 1.1 lot of stuff was introduced, for a...
View ArticleSigPloit – Telecom Signaling Exploitation Framework – SS7, GTP, Diameter & SIP
SiGploit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators...
View ArticleNoGoToFail: A Network Security Testing Tool For HTTPS And TLS/SSL Bugs
Nogotofail is a network security testing tool designed to help developers and security researchers spot and fix weak TLS/SSL connections and sensitive cleartext traffic on devices and applications in...
View Article