Tallow – Transparent Tor for Windows
Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. It also intercepts and handles DNS requests preventing potential leaks. Tallow has several applications, including: "Tor-ifying" applications there were never designed to use Tor Filter circumvention -- if you...
Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network
Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the network. It automatically recognizes the Email authentication packets going through network and interprets the passwords for all Mail Protocols including POP3, IMAP, SMTP. It can recover mail account passwords from all the Email applications, for example, Outlook, Thunderbird, Foxmail and...
Best Exploit Development Resources For Simulated Attacks
An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with a specific end goal to make unintended or unforeseen conduct happen on PC software, hardware, or something electronic. Such conduct habitually incorporates things like picking up control of a PC framework, permitting benefit escalation, or a...
Metateta – Automated Tool For Scanning And Exploiting Network Protocols
Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are formal models and strategies contained rules, techniques and formats that characterize communication between at least two gadgets over a network. Network protocols oversee the end-to-end procedures of opportune, secure and managed information or network communication. Also...
How to use Masscan to Enumerate Large Number of Hosts Quickly
Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10 million packets per second. It uses asynchronous transmission & a custom TCP/IP stack. So different threads are used for transmission & reception of packets. Masscan can be used to enumerate a large number of hosts very...
Airbash – A Shell Script For Automated WPA PSK Handshake Capture
Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash and Android Shell (tried on Kali Linux and Cyanogenmod 10.2) and utilizes aircrack-ng to filter for customers that are as of now associated with access points (AP). Those customers are then deauthenticated keeping in mind the end goal to...
SAWEF – Send Attack Web Forms
The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with HTTP, so far it, she is essential, bringing just a portion of the few features that need her to have, in any case, we were already being able to find on this device: Email Crawler in sites Crawler forms...
WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.
MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods by which we can perform tests. Some of major method sare beacon flooding, deauthentication, WPA- dos etc. In pentests mdk is used for testing the network infrastructures having 802.11 implementations and ensuring compliance standards. Options Syntax : mdk3 <interface> <testmode> <test-options> Mdk3...
Gcat – Sneaking Backdoor Use Gmail As A Command & Control Server
Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC code from Benjamin Donnelly. Also Read Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol Setup Gcat For this to work you need: A Gmail account (Use a dedicated account! Do not use your personal one!) Turn on...
Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol
Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery Protocol. This venture is still in the early periods of advancement. On the off chance that you keep running into any issues, please consider presenting an issue. It presently just keeps running on Linux. Build Sylkie Get...