Wednesday, January 23, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package,...

Must Need

Trape – People Tracker On The Internet

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created...
Wifite

Wifite 2.1.0 – Automated Wireless Attack Tool

A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's...

SMWYG (Show-Me-What-You-Got) : Tool To Perform OSINT & Reconnaissance On An...

SMWYG tool allows you to perform OSINT and reconnaissance on an organisation or an individual. It allows one to search 1.4 Billion clear text...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...
Sylkie

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries the following services: Virustotal ...
reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a...

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a...