Wednesday, January 16, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package,...

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...

Must Need

reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a...

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a...
BurpSuite Extension Ruby

BurpSuite Extension Ruby : Template to speed up building a...

Due the lake of examples and implementations of BurpSuite Extension Ruby, we have decided to make it easy for all rubyists to have a...

Triton – Dynamic Binary Analysis (DBA) Framework

Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations...
Dnsdiag

Dnsdiag – DNS Diagnostics and Performance Measurement Tools

Dnsdiag is a DNS Diagnostics and Performance Measurement Tools. Ever been wondering if your ISP is hijacking your DNS traffic? Ever observed any misbehavior...

Secret Keeper : Python Script To Encrypt & Decrypt Files With...

Secret Keeper is a file encryptor written in python which encrypt your files using Advanced Encryption Standard (AES). CBC Mode is used when creating...
PCILeech

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...
EvilOSX

EvilOSX – An Evil Remote Administration Tool For MacOS / OS...

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module...