Wednesday, October 24, 2018

Information Gathering

IG Tools

Information Gathering

Home Information Gathering
IG Tools
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
Arping

Arping – To Discover Hosts on a Computer Network

Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker)...
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...

Must Need

Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
XenoScan

XenoScan – Open source memory scanner written in C++

XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These...
Gpredict

Gpredict – Satellite Tracking Application

Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation algorithms together with NORAD two-line element...
Tallow

Tallow – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be...
Malwoverview

Malwoverview – Tool To Perform An Initial & Quick Triage On...

Malwoverview is a first response tool to perform an initial and quick triage on either a directory containing malware samples or a specific malware...
WMD

WMD – Weapon of Mass Destruction

WMD is a python tool with an accumulation of IT security software. The product is incapsulated in "modules". The modules consists of unadulterated python...