PentestBro : Port Scanning, Banner Grabbing & Web Enumeration Into One Tool
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses subdomain list of SecLists. Uses nmap service probes for banner grabbing. Uses list of paths for web enumeration. Example scan of "www.ccc.de" Scanned subdomain, IPs and ports Grabbed banner for each IP and port whois of all IP ranges
How Can I Find Someone’s Location Online?
The internet is changing how we look at things. That is why when you have a connection, looking for someone online is not that difficult. The difference between earlier times and now is that today, we have apps that have simplified the process. They use the internet to help you perform tasks like finding the location of the phone number,...
Top 10 Software Testing Tools in 2021
The introduction of innovative technologies has brought the latest updates in terms of software testing, development, design and delivery. Cost optimization is a top priority for companies around the world. In this case, most IT managers believe in integrating the latest IT technologies into their organization. Digital transformation is another important goal for industries and companies outside of the...
Top 7 Features to Add to Your Website
Your website is your digital store. It is where you can carve out a place for yourself online. Sure, there are many, many websites out there. There is a lot of competition and a lot of fighting for attention. That being said, it is still full of possibilities. A great website is one that doesnot necessarily replace a brick-and-mortar store....
Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection
Defeat-Defender is a powerfull batch file to disable windows defender,firewall,smartscreen and execute the payload. Usage Edit Defeat-Defender.bat on this line https://github.com/swagkarna/Defeat-Defender/blob/93823acffa270fa707970c0e0121190dbc3eae89/Defeat-Defender.bat#L72 and replace the direct url of your payloadRun the script "run.vbs" . It will ask for Admin Permission.If permission Granted The script will work Silently without console windows... After It Got Admin Permission It Will Disable Defender PUAProtectionAutomatic Sample SubmissionWindows FireWallWindows Smart...
SwissKnife : Scriptable VSCode Extension To Generate Or Manipulate Data
The developers SwissKnife. Do conversions and generations right out of vs code. Extendable with user scripts. Currently Available Scripts Base64 decodeBase64 encodeBinary To TextBip39 MnemonicCSV to MarkdownCount charactersCount wordsCrypto currency valueDate to TimestampEliptic Curve Key PairGenerate PasswordHTML Encode (AlL)Hex decodeHex encodeHex to RGBIdentify hashJWT DecodeJoin linesLorem IpsumMarkdown to HTMLMd5 hashNew Swissknife Script (JS)New Swissknife Script (TS)Password strengthRGB To HexRSA Key pairRandom...
MoveKit : Cobalt Strike Kit For Lateral Movement
Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET assemblies. The aggressor script handles payload creation by reading the template files for a specific execution type. IMPORTANT: To use the script a user will only need to load the MoveKit.cna aggressor script which will load all the...
ADFSBrute : A Script To Test Credentials Against Active Directory Federation Services
ADFSBrute is a script to test credentials against Active Directory Federation Services (ADFS), calculating the ADFS url of an organization and allowing password spraying or bruteforce attacks. The main idea is carrying out password spraying attacks with a random and high delay between each test and using a list of proxies or Tor to make the detection by the Blue...
Traitor : Automatic Linux Privesc Via Exploitation Of Low-Hanging Fruit E.G. GTFOBin
Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a root shell. Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy! It'll exploit most sudo privileges listed in GTFOBins to pop a root shell, as well as exploiting issues like a writable docker.sock....
Ronin : A Ruby Platform For Vulnerability Research & Exploit Development
Ronin is a Ruby platform for vulnerability research and exploit development. Ronin allows for the rapid development and distribution of code, Exploits, Payloads, Scanners, etc, via Repositories. Console Ronin provides users with a powerful Ruby Console, pre-loaded with powerful convenience methods. In the Console one can work with data and automate complex tasks, with greater ease than the command-line. >> File.read('data').base64_decode Database Ronin...