Wednesday, October 16, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop...

Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook & Gmail Credentials

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers....

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
Vayne-RaT

Vayne-RaT Free and Open Source Remote Administration

Vayne-RaT is Free and Open Source Remote Administration Tool Coded In C#. Android has emerged because the high mobile software package,...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development and Vulnerability Research

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a...

Must Need

ParamPamPam

ParamPamPam : Tool For Brute Discover Parameters

ParamPamPam is a tool for brute discover GET and POST parameters Installation With Docker ,Install...
Trape

Trape – Learn To Track The World & To Avoid Being...

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies...
PCILeech

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...

BoomER : Framework For Exploiting Local Vulnerabilities

BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a main objective, the detection...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference is that WAFs work...
Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
HT-WPS-Breaker

HT-WPS-Breaker : High Touch WPS Breaker

High Touch HT-WPS-BREAKER is a small tool based on the bash script language, it can help you to extract the wps pin...