Saturday, November 16, 2019

Information Gathering

IG Tools

Information Gathering

Home Information Gathering
IG Tools
netdiscover

Netdiscover – Live Host Identification

Netdiscover - simple ARP Scanner to scan for live hosts in a network Netdiscover is a simple ARP scanner which can...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker)...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS...
passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network Using passive_discovery6

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can...
Arping

Arping – To Discover Hosts on a Computer Network

Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing Enabled

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can...
WAFW00F

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference...
IT and Tech Challenges

The Top IT and Tech Challenges for Businesses in 2019

Companies, whether small, large, or enterprise-level organizations face their fair share of challenges at any given time. Currently,...

Must Need

Hacking Tools

Best Hacking Tools List for Hackers & Security Professionals 2018

A curated list of marvelous Hacking Tools. Hacking Tools are all the more frequently utilized by security businesses to test the vulnerabilities in system...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS Benchmark G

JShielder : Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer/ CIS...

JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will...
ReconDog

ReconDog – Reconnaissance Swiss Army Knife

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon them All the information...
Mosca : Manual Search Tool To Find Bugs Like A Grep Unix Command

Mosca : Manual Search Tool To Find Bugs Like A Grep...

Mosca is a manual analysis tool to find bugs like a grep unix command and since it is not dynamic the uses...
Echidna : Ethereum Fuzz Testing Framework

Echidna : Ethereum Fuzz Testing Framework

Echidna is a weird creature that eats bugs and is highly electrosensitive (with apologies to Jacob Stanley) More seriously,...
SilkETW

SilkETW : Tool To Abstract Away The Complexities Of ETW

SilkETW is a flexible C# wrapper for ETW, it is meant to abstract away the complexities of ETW and give people...