Osmedeus : Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability Scanning

0

Osmedeus allow you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. If you have no idea what are you doing just type the command below ./osmedeus.py -t example.com Also Read - Just-Metadata : Tool That Gathers & Analyzes Metadata About IP Addresses Installation git clone https://github.com/j3ssie/Osmedeus cd Osmedeus ./install.sh Features  Subdomain Scan. Subdomain TakeOver Scan. Screenshot the target. Basic...

Top 5 SQL Injection Tools for PenTest & Hacking

0

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are inserted into SQL statements via web page input. SQL injection is one of the most common web hacking techniques. Let's see the top 5 SQL injection tool to detect vulnerabilities! SQLMap Sqlmap is an open source SQL injection tool...

Mimikatz : A little Tool to Play with Windows Security

0

Mimikatz is a tool I've made to learn C and make somes experiments with Windows security. Mimikatz : A little Tool to Play with Windows Security Mimikatz can also perform pass-the-hash, pass-the-ticket or build Golden tickets. mimikatz 2.0 alpha (x86) release "Kiwi en C" (Apr 6 2014 22:02:03) Benjamin DELPY gentilkiwi ( benjamin@gentilkiwi.com ) http://blog.gentilkiwi.com/mimikatz ...

CommandoVM : Windows-Based Security Distribution for Penetration Testing

0

Welcome to CommandoVM a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script) Requirements Windows 7 Service Pack 1 or Windows 1060 GB Hard Drive2 GB RAM Instructions Create and configure a new Windows Virtual Machine Ensure VM is updated completely. You may have to check for updates, reboot, and check again until no more remainTake a snapshot of your...

FFM : Freedom Fighting Mode Open Source Hacking Harness

0

FFM is a hacking harness that you can use during the post-exploitation phase of a red-teaming engagement. It was presented at SSTIC 2018 and the accompanying slide deck is available at this url. If you're not familiar with this class of tools, it is strongly advised to have a look at them to understand what a hacking harness'...

IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

0

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro. The main features of IDArling are: hooking general user eventsstructure and enumeration supportHex-Rays decompiler syncingreplay engine and auto-savingdatabase loading and savinginteractive status bar widgetuser cursors (instructions, functions, navbar)invite and...

How to Write a Dissertation in Less Time Than You Plan

0

Let's face it. Many students have problems with an adequate estimate of time. When it comes to a particularly difficult task, the situation is even more aggravated. It seems to a student that there is still a lot of time to cope with the task. There are so long timeframes that it is possible to afford not to hurry....

Just-Metadata : Tool That Gathers & Analyzes Metadata About IP Addresses

0

Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and attempt to extrapolate relationships that might not otherwise be seen. Just-Metadata has "gather" modules which are used to gather metadata about IPs loaded into the framework across multiple resources on the internet....

PHPMussel : Anti-Virus Anti-Trojan Anti-Malware Solution

0

An ideal solution for shared hosting environments, where it's often not possible to utilise or install conventional anti-virus protection solutions, phpMussel is a PHP script designed to detect trojans, viruses, malware and other threats within files uploaded to your system wherever the script is hooked, based on the signatures of ClamAV and others. Features Licensed as GNU...

WinPwn : Automation for Internal Windows Penetrationtest / AD-Security

0

In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. For this reason I wrote my own script with automatic proxy recognition and integration called WinPwn. The script is mostly based on well-known large other offensive security Powershell projects. I only load...