Betwixt : Web Debugging Proxy Based On Chrome Devtools Network Panel

0

Betwixt is a web Debugging Proxy based on Chrome DevTools Network panel.Betwixt will help you analyze web traffic outside the browser using familiar Chrome DevTools interface. Installing Download the latest release for your operating system, build your own bundle or run Betwixt from the source code. Setting Up In order to capture traffic, you'll have to direct it to the proxy created by Betwixt in the background (http://localhost:8008). If...

Dirble : Fast Directory Scanning And Scraping Tool

0

Dirble is a website directory scanning tool for Windows and Linux. It's designed to be fast to run and easy to use. How to Use? Download one of the precompiled binaries for Linux, Windows, or Mac, or compile the source using Cargo, then run it from a terminal. The default wordlist Dirble uses is dirble_wordlist.txt in the same directory as the executable. It can...

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

0

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. About PTF It is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You...

RedRabbit : Red Team PowerShell Script

0

RedRabbit is a PowerShell script aimed at helping pentesters conduct ethical hacking #RedTeam. The aim is to highlight just how Powerful PowerShell is and how it can be used against you (Ethically). To Run You can either run locally by downloading the script or run remotely using: powershell –nop –c “iex(New-Object Net.WebClient).DownloadString(‘https://raw.githubusercontent.com/securethelogs/RedRabbit/master/redrabbit.ps1’)” If you run remotely, you will always get the latest version Also...

Sifter : A Osint, Recon & Vulnerability Scanner

0

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface...

WireGuard Brings The Evolution of VPNs

0

Most people don’t care about how the internet works; they want it to work. The same goes for other essential electronics and tech in the digital age, for example, routers and broadband connections. But every so often, there are significant breakthroughs that are a pretty big deal to techies. These are the revolutionary moments that change the way most people use the internet. And one...

FuzzBench : Fuzzer Benchmarking As A Service

0

FuzzBench is a free service that evaluates fuzzers on a wide variety of real-world benchmarks, at Google scale. The goal of FuzzBench is to make it painless to rigorously evaluate fuzzing research and make fuzzing research easier for the community to adopt. We invite members of the research community to contribute their fuzzers and give us feedback on improving...

SSRF Sheriff : Server Side Request Forgery

0

SSRF Sheriff is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking Event, but it is now being open-sourced for other organizations to implement and contribute back to. Features Repsond to any HTTP method (GET, POST, PUT, DELETE, etc.)Configurable secret token (see base.example.yaml)Content-specific responses With secret token in response body...

Evil SSDP : Create Fake UPnP Devices To Phish For Credentials

0

Evil SSDP responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden image over SMB, allowing you to...

Proton : Windows Post-Exploitation Framework Similar

0

Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10. Installation cd protonchmod +x...