What is DNS Filtering and How to Use It for Safe Browsing

0

In the simplest terms, Domain Name System (DNS) filtering is a method by which users of home, school, and work computers and smart devices can be prevented from accessing specific websites in an effort to keep them safer online while also keeping the devices they use safer from being infected with malware, viruses, and other malicious downloads. When you use...

Pineapple MK7 REST Client : WiFi Hacking Workflow With Pineapple Mark 7 API

0

PINEAPPLE MK7 REST CLIENT is a leading rogue access point and WiFi pentest toolkit for close access operations. It is also a passive and active attacks analyze vulnerable and mis-configured devices. Usage See/edit/execute the files in the samples/ folder System Authentication accessors/method system = PineappleMK7::System.new() system.host = (string) "172.16.42.1"system.host()system.port = (string) "1471"system.port()system.mac = (string) "00:13:37:DD:EE:FF"system.mac()system.password = (string) "P@55w0rD"system.login() host(), port() and mac() accessors return string login()...

K55 : Linux X86_64 Process Injection Utility

0

The K55 payload injection tool is used for injecting x86_64 shellcode payloads into running processes. The utility was developed using modern C++11 techniques as well as some traditional C linux functions like ptrace(). The shellcode spawned in the target process is 27 bytes and it executes /bin/sh (spawns a bash shell) within the target's address space. In the future,...

RadareEye : A Tool Made For Specially Scanning Nearby devices

0

RadareEye is a tool made for specially scanning nearby devices and execute our given command on our system when the target device comes in between range. NOTE:- RadareEye Owner will be not responsible if any user performs malicious activities using this tool. Use it for Learning purpose only. Installation of RadareEye : git clone https://github.com/souravbaghz/RadareEye Usage ./radare <mac_addr><option> Available Options Are -blue Bluetooth RadareEye-ble BLE...

ProtOSINT : Script Helps To Investigate Protonmail Accounts & ProtonVPN IP Addresses

0

ProtOSINT is a Python script that helps you investigate ProtonMail accounts and ProtonVPN IP addresses. Description This tool can help you in your OSINT investigation on Proton service (for educational purposes only).ProtOSINT is separated in 3 sub-modules: Test the validity of one protonmail account Try to find if your target have a protonmail account by generating multiple adresses by combining information...

Sigurls : A Reconnaissance Tool & It Fetches URLs From AlienVault’s OTX

0

Sigurls is a reconnaissance tool, it fetches URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. DiSCLAIMER: fetching urls from github is a bit slow. Usage To display help message for sigurls use the -h flag: $ sigurls -hUSAGE:sigurls OPTIONS:-d domain to fetch urls for-sE comma(,) separated list of sources to exclude-iS include subdomains' urls-sL list all the available sources-nC...

PongoOS : A Pre-Boot Execution Environment For Apple Boards

0

PongoOS is a pre-boot execution environment for Apple boards built on top of checkra1n. Building On macOS Install Xcode + command-line utilitiesRun make all Building On Linux Install clang (if in doubt, from apt.llvm.org)Install ld64 and cctools' strip.On Debian/Ubuntu these can be installed from the checkra1n repo: echo 'deb https://assets.checkra.in/debian /' | sudo tee /etc/apt/sources.list.d/checkra1n.listsudo apt-key adv --fetch-keys https://assets.checkra.in/debian/archive.keysudo apt-get updatesudo apt-get install -y...

Wprecon : A Vulnerability Recognition Tool In CMS WordPress

0

Wprecon (Wordpress Recon), is a vulnerability recognition tool in CMS Wordpress, 100% developed in Go. Features StatusFeatures✅Random Agent✅Detection WAF✅User Enumerator✅Plugin Scanner✅Theme Scanner✅Tor Proxy's✅Detection Honeypot✅Fuzzing Backup Files🔨Fuzzing Passwords🔨Vulnerability Scanner Usage Flag(s)Description-u, --url stringTarget URL (Ex: http(s)://example.com/). (Required)--users-enumerateUse the supplied mode to enumerate Users.--themes-enumerateUse the supplied mode to enumerate Themes.--plugins-enumerateUse the supplied mode to enumerate Plugins.--detection-wafI will try to detect if the target is using...

Mud-Visualizer : A Tool To Visualize MUD Files

0

Mud-Visualizer is a tool can be used to visualize the MUD files in JSON format. Warning: mud-visualizer is currently beta. Use at your own risk. This tool can be used to visualize the MUD files in JSON format. Motivation MUD files are plain text files in JSON format that contain ACL rules for a device. A MUD file can contains tens or hundrends...

Pidrila : Python Interactive Deepweb-Oriented Rapid Intelligent Link Analyzer

0

Pidrila is a Python Interactive Deepweb-oriented Rapid Intelligent Link Analyzer is really fast async web path scanner prototype developed by BrightSearch team for all ethical netstalkers. Installation & Usage git clone https://github.com/enemy-submarine/pidrila.gitcd pidrilapython3 pidrila.py -u Options Usage: pidrila.py Options:-U, --user-agent TEXT User-Agent-t, --timeout INTEGER Request timeout -A, --auth TEXT Basic HTTP auth, i.e. login:password-M, --max-connections-per-host INTEGERHow many simultaneous connections should weopen (per each...