CSS Keylogger – Chrome Extension And Express Server That Exploits Keylogging Abilities Of CSS

0

CSS Keylogger is a Chrome extension and Express server that exploits keylogging abilities of CSS. Using a simple script one can create a css file that will send a custom request for every ASCII character. Setup Chrome extension Download repository git clone https://github.com/maxchehab/CSS-Keylogging Visit chrome://extensions in your browser (or open up the Chrome menu by clicking the icon to the...

Volatility Framework – Volatile memory extraction utility framework

0

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized antiquities from unstable memory (RAM) tests. The extraction techniques are performed totally autonomous of the framework being researched yet offer visibilty into the runtime state of the framework. The system is planned to acquaint individuals with...

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

0

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is intentionally vulnerable to all kinds of silly hacks! Flying, endless cash, and more are all one client change or network proxy away. Are you ready for the mayhem?! Official Site click here Also Read Tallow – Transparent Tor...

chntpw – Windows Password, Account Forensics & Change User Password

0

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to administrator, as well as several other useful options. Using chntpw is a great way to reset a Windows Password or otherwise gain access to a Windows machine when you don’t know what the password it chntpw is...

Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router

0

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a WPS transaction. First, let's get to know what is WPS WPS is Wifi Protected Setup designed to quickly & easily authenticate a client to an AP mainly aimed for home users. Basically in WPS, the Access...

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

0
PEEPDF

Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java scripts & shell-codes. It can analyze suspicious objects & data streams within a PDF document. With some extensions installed, a security researcher can analyze the java-scripts & shell-codes in detail. Precisely some of the top features of...

Tallow – Transparent Tor for Windows

0

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. It also intercepts and handles DNS requests preventing potential leaks. Tallow has several applications, including: "Tor-ifying" applications there were never designed to use Tor Filter circumvention -- if you...

Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network

0

Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the network. It automatically recognizes the Email authentication packets going through network and interprets the passwords for all Mail Protocols including POP3, IMAP, SMTP. It can recover mail account passwords from all the Email applications, for example, Outlook, Thunderbird, Foxmail and...

Best Exploit Development Resources For Simulated Attacks

0

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with a specific end goal to make unintended or unforeseen conduct happen on PC software, hardware, or something electronic. Such conduct habitually incorporates things like picking up control of a PC framework, permitting benefit escalation, or a...

Metateta – Automated Tool For Scanning And Exploiting Network Protocols

0

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are formal models and strategies contained rules, techniques and formats that characterize communication between at least two gadgets over a network. Network protocols oversee the end-to-end procedures of opportune, secure and managed information or network communication. Also...