WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

0

Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2). Also Read - Ohmybackup : Scan Victim Backup Directories & Backup Files Download

Get Team Pass : Get Teamviewer’s ID & Password From A Remote Computer In The LAN

0

Get Team Pass is a tool with which you can get teamviewer's ID and password from a remote computer in the LAN.Most useful for postexploitation or sysadmins and is tested on windows 7 and windows 10 x86 and x64. Prerequisites You must have valid credentials on the remote computer Port 445 must be accesible on target machine Execution examples: hook.exe must be in...

Dnssearch : A Subdomain Enumeration Tool

0

Dnssearch is a subdomain enumeration tool. It takes an input domain ( -domain parameter ) and a wordlist ( -wordlist parameter ), it will then perform concurrent DNS requests using the lines of the wordlist as sub domains eventually bruteforcing every sub domain available on the top level domain. It supports a custom file extension ( -ext, default to php ) and other optional arguments: Usage of ./dnssearch:...

Liffy : Local File Inclusion Exploitation Tool

0

Liffy is a local file inclusion exploitation tool. A little python tool to perform Local file inclusion. Liffy-v2.0 is the improved version of it which was originally created by rotlogix/liffy. The latter is no longer available and the former hasn't seen any development for a long time. Main feature data:// for code executionexpect:// for code executioninput:// for code executionfilter:// for arbitrary file reads/proc/self/environ for code...

DLLPasswordFilterImplant : DLL Password Filter Implant With Exfiltration Capabilities

0

DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on a domain will trigger the registered DLL in order to exfiltrate the username and new password value prior successfully changing it in the Active Directory (AD). For more information about password filters consult the Microsoft documentation. Installing To install the password filter...

Ohmybackup : Scan Victim Backup Directories & Backup Files

0

Ohmybackup is to scan victim backup directories & backup files. It scans backup folders on target sites. Searches archived files in the folders it finds. With the 2-file scanning system, it adds extensions and filenames in different ways, making it more likely to be found. files/extensions.txt - This adds new extensions to the file, for example: by adding in the...

Gadgetinspector : Code Analyzer For Finding Deserialization Gadget

0

Gadgetinspector is a byte code analyzer for finding deserialization gadget chains in Java applications. This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities. By automatically discovering possible gadgets chains in an application's classpath penetration testers can quickly construct exploits and application security engineers can assess the impact of a...

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

0

OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It's an information security audit tool that creates intelligent wordlists based on the content of the target page. Install Need to: Python3.6, Bash (GNU Bourne-Again SHell)Optional: Git, Groff Source git clone https://github.com/owasp/D4N155.git cd D4N155 pip3 install -r requirements.txt bash main Or without git wget -qO- https://github.com/owasp/D4N155/archive/master.zip | bsdtar -xf- cd D4N155-master pip3 install -r requirements.txt bash main Also Read...

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

0

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo rules, vulnerability within the version of sudo being used (CVEs and vulns) and the use of dangerous binary, all of these could be abused to elevate privilege...

Adama : Searches For Threat Hunting & Security Analytics

0

Adama is a tool for searches for threat hunting and security analytics. A collection of known log and / or event data searches for threat hunting and detection. They enumerate sets of searches used across many different data pipelines. Implementation details are for ELK. Also Read - DecryptTeamViewer : Enumerate & Decrypt TeamViewer Credentials From...