SIPI – Simple IP Information Tools for Reputation Data Analysis

0

SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do search looking for reputation info from a set of open threat intelligence sources. Information about this IP like malware activity, malicious activity, blacklist, spam and botnet activity. Also Read Idisagree – Control Remote Computers Using Discord Bot...

Idisagree – Control Remote Computers Using Discord Bot & Python 3

0

Idisagree is a tool to Control remote computers using discord bot and python 3. If your target is a windows system, you may want to compile your payload. Do this with py2exe or pyinstaller. Prerequisites For Idisagree Python 3.x pip3 subprocess from python3 Discord from python3 Also Read CTF – Some Setup Scripts For Security Research Tools TESTED ON Kali Linux - Rolling...

CTF – Some Setup Scripts For Security Research Tools

0

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but it's really nice to have them in one place that's easily deployable to new machines and so forth. The install-scripts for these tools are checked regularly. Also Read XssPy – Web Application XSS Scanner Installers for the following...

XssPy – Web Application XSS Scanner

0

XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty Program. Also Read CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities Installation XssPy Type the following in the terminal. git clone https://github.com/faizann24/XssPy/ /opt/xsspy The tool works on Python 2.7 and you should have mechanize installed. If mechanize is...

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

0

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing of CVEs. The main objective of the software is to avoid doing direct and public lookups into the public CVE databases. Local lookups are usually faster and you can limit your sensitive queries via the Internet. CVE-Search...

Havij Download – Advanced Automated SQL Injection Tool

0

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely automated SQL Injection tool and it is dispersed by ITSecTeam, an Iranian security organization. The name Havij signifies "carrot", which is the apparatus' symbol. The tool is outlined with an easy to understand GUI that makes...

Blackbone – Memory Hacking Library For Windows

0

Blackbone is a tool used to hack windows memory library. Blackbone is licensed under the MIT License.  Features Of Blackbone Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write virtual memory Also Read BLEAH – A BLE Scanner For SMART Devices Hacking Process modules Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader...

Introspy – Security Profiling For Blackbox iOS

0

Introspy is a Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security issues. Introduction to Introspy tool This is the repository for the Introspy-iOS tracer. The tracer can be installed on a jailbroken device to hook and log security-sensitive iOS APIs called by applications running on the device. The tool...

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

0

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. It consists of various layer-2 attacks exploiting the weaknesses of different layer-2 protocols. Thus a pentester can identify the vulnerabilities in the deep layer 2 of the network....

List of Best Open Source SQL Injection Tools – 2019

0

SQL injection is a standout amongst the most widely recognized attacks against web applications. Here is the list of Best SQL Injection Tools 2019. Its attacks comprise of insertion or "injection" of a SQL query by means of the information from the customer to the application. An effective SQL injections endeavor can read delicate information from the database, alter database information...