Metateta – Automated Tool For Scanning And Exploiting Network Protocols

0

Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are formal models and strategies contained rules, techniques and formats that characterize communication between at least two gadgets over a network. Network protocols oversee the end-to-end procedures of opportune, secure and managed information or network communication. Also...

How to use Masscan to Enumerate Large Number of Hosts Quickly

0

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10 million packets per second. It uses asynchronous transmission & a custom TCP/IP stack. So different threads are used for transmission & reception of packets. Masscan can be used to enumerate a large number of hosts very...

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

0

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash and Android Shell (tried on Kali Linux and Cyanogenmod 10.2) and utilizes aircrack-ng to filter for customers that are as of now associated with access points (AP). Those customers are then deauthenticated keeping in mind the end goal to...

SAWEF – Send Attack Web Forms

0

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with HTTP, so far it, she is essential, bringing just a portion of the few features that need her to have, in any case, we were already being able to find on this device: Email Crawler in sites Crawler forms...

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

0

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods by which we can perform tests. Some of major method sare beacon flooding, deauthentication, WPA- dos etc. In pentests mdk is used for testing the network infrastructures having 802.11 implementations and ensuring compliance standards. Options Syntax : mdk3 <interface> <testmode> <test-options> Mdk3...

Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server

0

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC code from Benjamin Donnelly. Also Read Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol Setup Gcat For this to work you need: A Gmail account (Use a dedicated account! Do not use your personal one!) Turn on...

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

0

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery Protocol. This venture is still in the early periods of advancement. On the off chance that you keep running into any issues, please consider presenting an issue. It presently just keeps running on Linux. Build Sylkie Get...

Nipe- Script To Make Tor Network Your Default Gateway

0

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables to course all activity over Tor. The issue is that Tor just backings TCP and not UDP. So the majority of your UDP applications like "dns queries" are going to fail. The script likewise has a difficult issue if...

FireMaster – The Firefox Master Password Recovery Tool

0

FireMaster is the principal ever tool created to recoup your lost or overlooked Master Password of Firefox utilizing easy to cutting-edge password recovery techniques. The master password is utilized by Firefox to secure the put-away login/password data for all visited the sites. In the event that the master password is overlooked, at that point, there is no real way to...

Unicornscan – Network Scanning Tool to Find the Open Ports

0

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike other port scanning tools) to a host and waits for the target’s response. After getting the response the TTL value is calculated for each port and thereby identifying the operating system. For eg, if the ttl=128, the operating system is...