Neofetch – A command-line System Information Tool

0

Neofetch is a command-line system information tool written in bash 3.2+. Neofetch displays information about your operating system, software and hardware in an aesthetic and visually pleasing way. The overall purpose of Neofetch is to be used in screen-shots of your system. Neofetch shows the information other people want to see. There are other tools available for proper system statistic/diagnostics. The...

Drozer v2.4.4 – The Leading Security Assessment Framework For Android

0

Drozer 2.4.4  is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming the role of an app and interacting with the Dalvik VM, other apps' IPC endpoints and the underlying OS. Drozer provides tools to help you use, share and understand public Android exploits. It helps you to...

Put2Win – Script To Automatize Shell Upload By PUT HTTP Method To Get Meterpreter

0

Put2Win is a script to automatize shell upload by PUT HTTP method to get meterpreter. It's necessary to have installed nmap and msfvenom tools for a correct operation. Also ReadJoomscan – OWASP Joomla Vulnerability Scanner Project Put2Win Usage ./Put2win.sh -h This script automatize shell upload by PUT HTTP method to get meterpreter. Usage: ./Put2win.sh -t TARGET -u URL_PATH -l LHOST Examples: ./Put2win.sh -t 192.168.1.80 -u...

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted UDP/FakeTCP/ICMP

0

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP Environment). It can defend Replay-Attack and supports Multiplexing. It also acts as a Connection Stabilizer. When used alone,udp2raw tunnels only UDP traffic. Nevertheless,if you used udp2raw + any UDP-based VPN together,you can tunnel any traffic(include TCP/UDP/ICMP),currently...

Mail Security Testing – Framework For Mail Security & Filtering Solutions

0

Mail Security Testing Framework is a testing framework for mail security and filtering solutions. Mail Security Testing Installation The mail security testing framework works with with Python >=3.5. Just pull this repository and go ahead. No further dependencies are required. Usage The script mail-tester.py runs the tests. Read the help message with ./mail-tester.py --help and check the list of test and evasion modules...

SocialBox – A Bruteforce Attack Framework[ Facebook , Gmail , Instagram ,Twitter]

0

SocialBox is a Bruteforce Attack Framework . SocialBox Installation sudo apt-get install git sudo git clone https://github.com/TunisianEagles/SocialBox.git cd SocialBox chmod +x SocialBox.sh chmod +x install-sb.sh ./install-sb.sh ./SocialBox.sh Tested On Backbox linux Ubuntu Kali linux Also ReadDVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s Screenshots Credit: Belahsan Ouerghi

SharpSploit – A .NET Post-Exploitation Library Written in C#

0

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers. It is named, in part, as a homage to the PowerSploit project, a personal favorite of mine! While SharpSploit does port over some functionality from PowerSploit, my intention is not at...

Joomscan – OWASP Joomla Vulnerability Scanner Project

0

OWASP Joomla! Vulnerability Scanner  or JoomScan is an open source project, developed with the aim of automating the task of vulnerability detection and reliability assurance in Joomla CMS deployments. Implemented in Perl, this tool enables seamless and effortless scanning of Joomla installations, while leaving a minimal footprint with its lightweight and modular architecture. It not only detects known offensive vulnerabilities,...

Exploit CVE-2017-6079 – Blind Command Injection In Edgewater Edgemarc Devices Exploit

0

This exploit was developed based on the technical description by depthsecurity https://depthsecurity.com/blog/cve-2017-6079-blind-command-injection-in-edgewater-edgemarc-devices The HTTP web-management application on Edgewater Networks Edgemarc appliances has a hidden page that allows for user-defined commands such as specific iptables routes, etc., to be set. You can use this page as a web shell essentially to execute commands, though you get no feedback client-side from the web...

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

0

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date: 09/04/2018 Exploit Author: Fernandez Ezequiel DVR-Exploiter By: Belahsan Ouerghi Contact:...