Thursday, February 27, 2020

Security Hacker

Security Hacker

Home Security Hacker
KBD-Audio

KBD-Audio : Tools For Capturing & Analysing Keyboard Input Paired With Microphone Capture

KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants...
UBoat

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with...
DDoS

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries...
Lynis

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others....
Lightbulb Framework

Lightbulb Framework : Tools For Auditing WAFS

LightBulb Framework is an open source python framework for auditing web application firewalls and filters. LightBulb Framework Synopsis The framework consists of two main...
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there...
Apache Struts

Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts

Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow...

Must Need

Remote-Desktop-Caching

Remote Desktop Caching : Tool To Recover Old RDP

Remote Desktop Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. It is extremely useful...
Nessus Map : Parse Nessus File(s) & Shows Output In Interactive UI

Nessus Map : Parse Nessus File(s) & Shows Output In Interactive...

Nessus Map parse .nessus file(s) and shows output in interactive User Interface. It just works by creating XML directory in Nessus_Map home...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
HeapHopper

HeapHopper – A Bounded Model Checking Framework For Heap-Implementations

HeapHopper is a bounded model checking framework for Heap-implementation.  HeapHopper Setup sudo apt update && sudo apt install build-essential python-dev virtualenvwrapper git clone https://github.com/angr/heaphopper.git && cd ./heaphopper mkvirtualenv...
LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

LOLBITS : C# Reverse Shell Using BITS As Communication Protocol

LOLBITS is a C# reverse shell that uses Microsoft's Background Intelligent Transfer Service (BITS) to communicate with the Command and Control...
Vulnado – Intentionally Vulnerable Java Application

Vulnado – Intentionally Vulnerable Java Application

Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through...
Nginx Log Check : Nginx Log Security Analysis Script

Nginx Log Check : Nginx Log Security Analysis Script

Nginx Log Check is a nothing but a Nginx Log Security Analysis Script. Following are some of the feature for the script...