XSHOCK : Tool To Exploits ShellShock

0

XSHOCK Shellshock Exploit. All founded directories will be saved in vulnurl.txt file. The results of the executed commands are saved in response.txt. Features This tool include: CGI VULNERABILITYDIRECTORY SCANRUN COMMAND WITH FOUNDED CGISHOW VULNERABLE URLSUPDATE PROXY Installation git clone https://github.com/capture0x/xShock/cd xShockpip3 install -r requirements.txt Also Read - Token Reverser : Word List Generator To Crack Security Tokens Usage python3 main.py CGI VULNERABILITY Checks cgi-bin directory on the...

Chepy : A Python lib/cli Equivalent Of The Awesome CyberChef Tool

0

Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef. A reasonable amount of effort was put behind it to make it compatible to the various functionalities that CyberChef offers, all in a pure Pythonic manner. There are some key advantages and disadvantages that it...

SShuttle: Where Transparent Proxy Meets VPN Meets SSH

0

SShuttle is a transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin. Works with Linux and MacOS. Supports DNS tunneling. As far as I know, it is the only program that solves the following common case: Your client machine (or router) is Linux, FreeBSD, or MacOS.You have access to a remote...

Lazydocker : The Lazier Way To Manage Everything Docker

0

Lazydocker is a simple terminal UI for both docker and docker-compose, written in Go with the gocui library. Minor rant incoming: Something's not working? Maybe a service is down. docker-compose ps. Yep, it's that microservice that's still buggy. No issue, I'll just restart it: docker-compose restart. Okay now let's try again. Oh wait the issue is still there. Hmm. docker-compose...

Pypykatz : Mimikatz Implementation In Pure Python

0

Pypykatz is a mimikatz implementation in pure Python and can be runs on all OS's which support python>=3.6. Installing Install it via pip or by cloning it from github. The installer will create a pypykatz executable in the python's Script directory. You can run it from there, should be in your PATH. Via PIP pip3 install pypykatz Via Github Install Pre-Requirements pip3 install minidump minikerberos...

3 Reasons to Use a VPN in a Net Neutrality-Free World

0

In the early days of the internet, internet communication was impartial. Data relaying was not influenced by ISPs based on the content, platform, source & destination address and user. Netizens could freely surf through the web without manipulation or interference from the Internet Service Providers. In other words, the net was neutral to all individuals and businesses alike. The end...

Token Reverser : Word List Generator To Crack Security Tokens

0

Token Reverser is a word list generator to crack security tokens. Example Use Case You are testing reset password functionReset password token was sent to your email box (e.g. 582431d4c7b57cb4a3570041ffeb7e10)You suppose, it is a md5 hash of the data you provided during registration process You remember that on registration you entered the following data:First name: FooLast name: BarEmail: foo.bar@example.comBirth date: 1985-05-23Phone: 202-555-0185Address:...

ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce

0

ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well as resolve subdomains with wildcard handling and easy input-output support.  Features Simple and modular code base making it easy to contribute.Fast And Simple active subdomain scanning.Handles wildcard subdomains in a smart manner.Optimized for ease of useStdin and stdout support for integrating in...

AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

0

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names Also Read - Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel Example: Download

Jeopardize : A Low Cost Threat Intelligence&Response Tool

0

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat intelligence&response capabilities against phishing domains at the minimum cost as possible. It detects registered phishing domain candidates (typosquatting, homograph etc.), analyzes them and assigns a risk score to them. After then, it sends valid-looking credentials to the login forms on those...