URH : Universal Radio Hacker To Investigate Wireless Protocols Like A Boss

0

URH (Universal Radio Hacker) is a software for investigating unknown wireless protocols. Features include Hardware Interfaces for common Software Defined Radios Easy Demodulation of signals Assigning Participants to keep overview of your data Customization Decoding to crack even sophisticated encodings like CC1101 data whitening Assign Labels to reveal the logic of the protocol Fuzzing Component to find security leaks ...

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

0

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an email then it does two simple useful jobs with it: Search for public leaks for the email and returns the result with the most useful details about the leak (Using haveibeenpwned API) and tries to...

EvilOSX – An Evil Remote Administration Tool For MacOS / OS X

0

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module system, No bot dependencies, Undetected by anti-virus, Persistent, GUI and CLI support, Retrieve Chrome passwords, Retrieve iCloud tokens and contacts, Retrieve/monitor the clipboard, Retrieve browser history, Phish for iCloud passwords via iTunes, iTunes (iOS) backup...

Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

0

Autocrack is python script is a Hashcat wrapper to help automate the cracking process. The script includes multiple functions to select a set of wordlists and rules, as well as the ability to run a bruteforce attack, with custom masks, before the wordlist/rule attacks. Autocrack uses Python 3, which is usually installed already in various Linux distributions. To install Python...

Dirhunt – Find Web Directories Without Bruteforce

0

Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of" mode enabled. Dirhunt is also useful if the directory listing is not enabled. It detects directories with false 404 errors, directories where an empty index file has been created to hide things and much more. $...

IPv4Bypass – Using IPv6 to Bypass Security

0

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python bypass.py -h Usage: bypass.py Options: -h, --help show this help message and exit -i INTERFACENO Network interface (e.g. eth0) -r IPRANGE ...

Noisy – Simple random DNS, HTTP/S Internet Traffic Noise Generator

0

Noisy is a simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to make your web traffic data less valuable for selling and for extra obscurity.Tested on MacOS High Sierra, Ubuntu 16.04 and Raspbian Stretch and is compatable with both Python 2.7 and 3.6 These instructions will get you...

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

0

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep in transaction data to plot a graph out of the information. Orbit Usage Run orbit.py with python3 as follows python3 orbit.py Enter the wallet address __ | |...

Blackowl – Tool To Gather Information, Based On Operative-Framework

0

Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests pythonwhois beautifulsoup4 Also Read Scout2 – Security Auditing Tool For AWS Environments How To Use Blackowl $ git clone https://github.com/qqwaszx/blackowl.git ; cd blackowl $ pip install -r requirements.txt $ python main.py : blackowl > help Demo Modules /core/modules/ CMS Gathering : CMS Detection Email to...

Seeker – Find Device Information & Geo Location with High Accuracy

0

Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker is an alternative best used when it's not possible to directly geolocate IP addresses. Seeker Hosts a fake website on Apache Server and uses Ngrok to generate a SSL link which asks for Location Permission and if the user allows it, we...