Monday, June 1, 2020

Information Gathering

IG Tools

Information Gathering

Home Information Gathering
IG Tools
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker)...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS...
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can...
IT and Tech Challenges

The Top IT and Tech Challenges for Businesses in 2019

Companies, whether small, large, or enterprise-level organizations face their fair share of challenges at any given time. Currently,...
Arping

Arping – To Discover Hosts on a Computer Network

Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...

Must Need

Introspy

Introspy – Security Profiling For Blackbox iOS

Introspy is a Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
Trape

Trape – Learn To Track The World & To Avoid Being...

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies...
Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
RapidScan : The Multi-Tool Web Vulnerability Scanner

RapidScan : The Multi-Tool Web Vulnerability Scanner

RapidScan is the multi tool web vulnerability scanner. It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning...
XML External Entity – XXE Injection Payload List

XML External Entity – XXE Injection Payload List

In this section, we'll explain what XML external entity injection is, describe some common examples, explain how to find and exploit...
Tea : SSH-Client Worm

Tea : SSH-Client Worm

Tea is a ssh-client worm made with tas framework. How it works? This is a...
RITA : Real Intelligence Threat Analytics

RITA : Real Intelligence Threat Analytics

RITA is a real intelligence threat analytics. RITA is an open source framework for network traffic analysis. The framework...