Wednesday, January 16, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package,...

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...

Must Need

RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker) system to the destination...
Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature enough to ward off...
Getsploit

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature...