GitMiner – Tool For Advanced Mining For Content On Github

0

GitMiner is a Advanced search tool and automation in Github. This tool aims to facilitate research by code or code snippets on github through the site's search page. GitMiner Requirements lxml requests argparse json re Installation $ git clone http://github.com/UnkL4b/GitMiner $ cd GitMiner ~/GitMiner $ pip3 install -r requirements.txt Docker $ git clone http://github.com/UnkL4b/GitMiner $ cd GitMiner $ docker build -t gitminer . $ docker run -it gitminer -h Also...

Easyssh – The SSH Connection Manager To Make Your Life Easier

0

Easyssh is a complete, efficient and easy-to-use manager. Create and edit connections, groups, customize the terminal, with multiple instances of the same connection. Easyssh Features Manage connections and groups Customize terminal Dark Theme Multiple instances of same connection Restore opened hosts Sync ~/.ssh/config Also Read Archery – Open Source Vulnerability Assessment & Management Helps Developers & Pentesters To Perform Scans & Manage...

Archery – Open Source Vulnerability Assessment & Management Helps Developers & Pentesters To Perform Scans & Manage Vulnerabilities

0

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource tools to perform comprehensive scanning for web application and network. Archery Requirement Python 2.7 OpenVas 8, 9 OWASP ZAP 2.7.0 Selenium Python Firefox Web driver Start Application $ python manage.py runserver 0.0.0.0:8000 Installation $ git clone https://github.com/archerysec/archerysec.git $ cd archerysec $ chmod...

BootStomp – A Bootloader Vulnerability Bug Finder

0

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage vulnerabilities. BootStomp works with boot-loaders compiled for ARM architectures (32 and 64 bits both) and that results might slightly vary depending on angr and Z3's versions. Requirements angr $ pip install angr IDA PRO IDA Decompiler Run BootStomp...

Trape – Learn To Track The World & To Avoid Being Traced

0

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies could monitor you, obtaining information beyond your IP. Also Read XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool Session Recognized Using Trape Facebook Twitter VK Reddit Gmail tumblr Instagram Github Bitbucket Dropbox Spotify PayPal Amazon Foursquare (new) ...

Anti-DDoS : Anti DDOS Bash Script To Defend Against DDOS Attacks

0

An open source project developed against the DOS and DDoS attack by writing iptables rules into the Linux OS is called the Anti-DDoS project. We need to make sure before implementing or executing the rules take all necessary defense configurations. The anti-DDoS project will work only on Linux OS, it will not provide 100% security, but it helps you to...

Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

0

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1 customizable and it works only on LAN. Blackeye Usage git clone https://github.com/thelinuxchoice/blackeye cd blackeye bash blackeye.sh Also Read Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood Disclaimer This tool was made for educational purposes! Using BlackEye for attacking targets without prior mutual...

Rootstealer – Trick To Inject Commands On Root Terminal

0

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject command with X11 lib. Rootstealer Installation # apt-get install libX11-dev libxtst-dev # cd rootstealer/sendkeys; Edit file rootstealer/cmd.cfg and write your command to inject. You can take that following: # make; cd .. #to back to path rootstealer/...

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

0

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website or you can use this tool to Get Shells, Sends, Deface, cPanels & Databases. Currently tol is supported by CMS like WordPress, Joomla, Drupal, PrestaShop, and LokoMedia. Also Read Blind-Bash : Project To Obfuscate Your Bash Code XAttacker Installation Linux...

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

0

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization proxy servers as bots. This script isn't all inclusive and you can't simply drop Pentagon/NSA/whatever site with only a solitary mouse click. Each attack is one of a kind, and for every site you'd have to look for vulnerabilities...