JCS – Joomla Vulnerability For Penetration Testing Component Scanner

0

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database can update from several resources and a Crawler has been implemented to find components and component's link. This version supports Exploitdb and Packetstorm vulnerabilities to create a database for joomla components it can also create a...

OverThruster – HID Attack Payload Generator For Arduinos

0

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip, like the CJMCU-BEETLE, or the new LilyGo "BadUSB" devices popping up on ebay and aliexpress that look like USB sticks but contain an Arduino. I wrote this because the few other tools out there that...

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F

0

Web Application firewalls are typically firewalls working on the application layer which monitors & modifies HTTP requests. The key difference is that WAFs work on Layer 7 - Application Layer of the OSI Model. Basically, all WAFs protect against different HTTP attacks & queries like SQLi & XSS. Since the firewall is able to detect HTTP methods, SQL queries &...

Online Password Bruteforce with Hydra-GTK

0

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like telnet, ssh, http, https, smb, snmp, smtp etc. Hydra supports 30+ protocols including their SSL enabled ones. It brute forces on services we specify by using user-lists & wordlists. Hydra works in 4 modes: One username & one password User-list & One...

Evilginx – MITM Attack Framework For Phishing Credentials & Session Cookies

0

Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server, which utilizes proxy_pass and sub_filter to proxy and modify HTTP content, while intercepting traffic between client and server. Installing Evilginx Evilginx provides an installation script install.sh that takes care of installing the whole package on any Debian...

SPF – SpeedPhish Framework For Phishing Exercises

0

SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering phishing exercises. Requirements For SPF dnspython twisted PhantomJS Also Read Ghost Phisher – Wireless & Ethernet Attack Software Application How to install SPF ? Run the below command to install the SPF tool; pip install dnspython pip install pycrypto apt-get install python-twisted-web apt-get install phantomjs git...

Ghost Phisher – Wireless & Ethernet Attack Software Application

0

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks. Supported OS Ghost Phisher The Software runs on any Linux machine with the programs prerequisites,...

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

0

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards seem to effectively jam within about a block radius with heavy access point saturation. Granularity is given in the options for more effective targeting. It requires python 2.7, python-scapy, a wireless card capable of injection. Also...

Kwetza – Tool To Infect An Existing Android Application With A Meterpreter Payload

0

Kwetza is a tool that allows you to infect an existing Android application with a Meterpreter payload. Python script to inject existing Android applications with a Meterpreter payload. What Kwetza actually do ? Kwetza infects an existing Android application with either custom or default payload templates to avoid detection by antivirus. Kwetza allows you to infect Android applications using the target...

Pemcracker – Tool to crack encrypted PEM files

0

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to recover the password for encrypted PEM files while utilizing all the CPU cores. It still uses high level OpenSSL calls in order to guess the password. As an optimization, instead of continually checking against the PEM...