PwnAdventure3 – Game Intentionally Vulnerable To Hacks
PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is intentionally vulnerable to all kinds of silly hacks! Flying, endless cash, and more are all one client change or network proxy away. Are you ready for the mayhem?! Official Site click here Also Read Tallow – Transparent Tor...
chntpw – Windows Password, Account Forensics & Change User Password
chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to administrator, as well as several other useful options. Using chntpw is a great way to reset a Windows Password or otherwise gain access to a Windows machine when you don’t know what the password it chntpw is...
Reaver + PixieWPS – Tool to Bruteforce the WPS of a WiFi Router
Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a WPS transaction. First, let's get to know what is WPS WPS is Wifi Protected Setup designed to quickly & easily authenticate a client to an AP mainly aimed for home users. Basically in WPS, the Access...
PEEPDF : A One Stop Tool for PDF Document Forensic Analysis
Peepdf is a tool for the forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java scripts & shell-codes. It can analyze suspicious objects & data streams within a PDF document. With some extensions installed, a security researcher can analyze the java-scripts & shell-codes in detail. Precisely some of the top features of...
Tallow – Transparent Tor for Windows
Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be handled by Tor, e.g. UDP, is blocked. It also intercepts and handles DNS requests preventing potential leaks. Tallow has several applications, including: "Tor-ifying" applications there were never designed to use Tor Filter circumvention -- if you...
Mail Password Sniffer – Tool To Recover Mail Passwords Passing Through The Network
Mail Password Sniffer is the free Email Password Sniffing and Recovery Software to recuperate mail account passwords going through the network. It automatically recognizes the Email authentication packets going through network and interprets the passwords for all Mail Protocols including POP3, IMAP, SMTP. It can recover mail account passwords from all the Email applications, for example, Outlook, Thunderbird, Foxmail and...
Best Exploit Development Resources For Simulated Attacks
An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with a specific end goal to make unintended or unforeseen conduct happen on PC software, hardware, or something electronic. Such conduct habitually incorporates things like picking up control of a PC framework, permitting benefit escalation, or a...
Metateta – Automated Tool For Scanning And Exploiting Network Protocols
Metateta is an automated tool for scanning and exploiting network protocols using metasploit and for faster pen testing for large networks. Network protocols are formal models and strategies contained rules, techniques and formats that characterize communication between at least two gadgets over a network. Network protocols oversee the end-to-end procedures of opportune, secure and managed information or network communication. Also...
How to use Masscan to Enumerate Large Number of Hosts Quickly
Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10 million packets per second. It uses asynchronous transmission & a custom TCP/IP stack. So different threads are used for transmission & reception of packets. Masscan can be used to enumerate a large number of hosts very...
Airbash – A Shell Script For Automated WPA PSK Handshake Capture
Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash and Android Shell (tried on Kali Linux and Cyanogenmod 10.2) and utilizes aircrack-ng to filter for customers that are as of now associated with access points (AP). Those customers are then deauthenticated keeping in mind the end goal to...