AutoRDPwn : The Shadow Attack Framework

0

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (cataloged as a feature by Microsoft) allows a remote attacker to view their victim's desktop without their consent, and even control it on demand, using tools native to the operating system itself. Thanks to the additional modules, it is...

EvilApp : Phishing Attack Using An Android Application

0
REW-sploit : Emulate And Dissect MSF And *Other* Attacks

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication protection. EvilApp brings as an example the hijacking and injection of cookies for authenticated Instagram sessions. Also Read - DiscordRAT : Discord Remote Administration Tool Fully Written In Python Requirement Android Studio Tested on Kali Linux 2020.1 x64 # git clone https://github.com/thelinuxchoice/EvilApp...

S3BucketList : Firefox Plugin That Lists Amazon S3 Buckets Found In Requests

0

S3BucketList is a Firefox plugin that records S3 Buckets found in requests. It is currently a work in progress and additional features will be added in the future. his plugin will also be ported to other browsers in the future. Stay tuned! Installation This plugin is already available in Firefox Browser Add-ons. Built With HTML - Markup LanguageJavascript - Programming Language Also Read -...

Locator : Geolocator, IP Tracker, Device Info by URL (Serveo & Ngrok)

0

Locator is a tool used for Geolocator, Ip Tracker, Device Info by URL (Serveo and Ngrok). It uses tinyurl to obfuscate the Serveo link. Usage git clone https://github.com/thelinuxchoice/locator cd locator bash locator.sh Also Read - Dalfox : Parameter Analysis & XSS Scanning Tool Disclaimer Usage of Locator for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey...

Guardedbox : Online Client-Side Manager For Secure Storage & Secrets Sharing

0

GuardedBox is an open-source online client-side manager for secure storage and secrets sharing. It allows users to upload secrets to a centralized server and retrieve them at anytime and from anywhere. It also allows users to share their secrets with other users, individually or via groups. Secrets are stored encrypted server-side. The encryption is performed client-side by JavaScript code. It is...

Faraday : Collaborative Penetration Test & Vulnerability Management Platform

0

Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit. Made for true pentesters! It was made to let you take advantage of the available tools in the community in a truly multiuser way. It crunches the data you load into different visualizations that...

Minimalistic Offensive Security Tools

0

Minimalistic is a simple SMB login attack and password spraying tool. It takes a list of targets and credentials (username and password) as parameters and it tries to authenticate against each target using the provided credentials. Despite its minimalistic design, the tool keeps track of everything by writing every result into a text file. This allows the tool to be...

Carina : Webshell, Virtual Private Server (VPS) & cPanel Database

0

Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so that we don't need to store webshell, VPS or cPanel data in "strange places". Install $ git clone https://github.com/c0delatte/carina && cd carinaRun composer updateEdit .env.example with your database configurationRun php artisan migrate for generate required tablesRun php artisan serve Also Read -...

Nishang : Offensive PowerShell For Red Team, Penetration Testing & Offensive Security

0

Nishang is a framework and collection of scripts and payloads which enables usage of PowerShell for offensive security, penetration testing and red teaming. Nishang is useful during all phases of penetration testing. Usage Import all the scripts in the current PowerShell session (PowerShell v3 onwards). PS C:nishang> Import-Module .nishang.psm1 Use the individual scripts with dot sourcing. PS C:nishang> . C:nishangGatherGet-Information.ps1 PS C:nishang> Get-Information To get...

Web Hacker’s Weapons : Collection Of Cool Tools Used By Web Hackers

0

Web Hacker's Weapons is a collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting. Weapons Army-Knife/ALLBurpSuitethe BurpSuite projectArmy-Knife/SCANjaelesThe Swiss Army knife for automated Web Application TestingArmy-Knife/ALLzaproxyThe OWASP ZAP core projectDiscovery/ALLOneForAllOneForAll是一款功能强大的子域收集工具Discovery/ALLaquatoneA Tool for Domain FlyoversDiscovery/ALLlazyreconThis script is intended to automate your reconnaissance process in an organized fashionDiscovery/CRAWLPhotonIncredibly fast crawler designed for OSINT.Discovery/CRAWLcc.pyExtracting URLs of a specific target based...