Autodeauth : A Tool Built To Automatically Deauth Local Networks

0

Autodeauth is a tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $ chmod +x setup.sh$ sudo ./setup.sh This can be changed by editing /etc/systemd/system/autodeauth.service Enter your WiFi interface to use with the autodeauth service: wlan0 Installed!, you can use sudo autodeauth -h to see available options. Use sudo systemctl start autodeauth...

Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator

0

Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that works as an interpreter for the traffic generated by the malicious JavaScript payload that powers this tool (toxin.js). This project started as (and still is) a research-based creative endeavor to explore the exploitability depth that an...

Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

0

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user via email or Telegram notifications and also can be imported in Defect-Dojo if an advanced vulnerability management is needed. Moreover, Rekono includes a Telegram bot that can be used to...

ReconPal : Leveraging NLP For Infosec

0

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to do right. One needs to know about the right tools, correct queries/syntax, run those queries, correlate the information, and sanitize the output. All of this might be easy for a seasoned infosec/recon professional to do, but for rest, it...

Top IP Management Softwares in 2022

0

Businesses have been getting more and more digitalized. This is great, but rapid digitization has made it difficult for businesses to track, manage, and retain big databases of devices and networks. Especially small businesses still struggle with a lack of accessible and trustworthy IP address management technology. There have been great developments in that area lately and we now have...

Pros & Cons Of Incorporating Cybersecurity Into SEO Strategy

0

As the internet continues to grow, so does the threat of cybercrime. We all know that the internet is full of sensitive information and a lot of people are getting hacked and identities were stolen. In order to protect yourself, it’s important to optimize your website for search engines, which also includes incorporating SEO security. There are some benefits...

System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware

0

System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to you by Winsider Seminars & Solutions, Inc. System requirements Windows 7 or higher, 32-bit or 64-bit. Features A detailed overview of system activity with highlighting.Graphs and statistics allow you quickly to track down resource hogs and runaway processes.Can't edit or delete a file?...

dBmonster : Track WiFi Devices With Their Recieved Signal Strength

0

dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their sent packets (sniffed with TShark). These dBm values will be plotted to a graph with matplotlib. It can help you to identify the exact location of nearby WiFi devices (use a directional WiFi antenna for the best results) or to find out how...

Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques

0

Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here you will find explanations of how these techniques work, receive advice on detection, and get sample source code for testing your detection coverage. Content This repository covers two classes of attacking techniques that extensively use internal Windows mechanisms plus provides suggestions...

RPCMon : RPC Monitor Tool Based On Event Tracing For Windows

0

RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like Procmon for easy usage, and uses James Forshaw .NET library for RPC. RPCMon can show you the RPC functions being called, the process who called them, and other relevant information.RPCMon uses a hardcoded RPC dictionary for fast RPC information...