Tool-X : Kali Linux Hacking Tool Installer
Tool-X is a Kali linux hacking Tool installer, with the help of it you can install best hacking tools in Rooted or Non Rooted Android devices. It is Specially made for Termux and GNURoot Debian Terminal. It is available for both Android and Ubuntu. You can install any tools by single click. You can install almost 150 tools in termux...
Leaked – A Checking Tool For Hash Codes And Passwords Leaked
A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords Check hash code Exit Installation Linux sudo apt update && apt install python3 python3-pip git clone https://github.com/GitHackTools/Leaked cd Leaked pip3 install requests python3 leaked.py Windows Download and run Python 3 setup file from Python.org. In Install Python 3 , enable Add Python 3.7 to...
UploadScanner : HTTP file upload scanner for Burp Proxy
UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every security analyst. Various automated and semi-automated security testing tools exist to simplify the task. HTTP based file uploads are one specialised use case. However, most automated web application security scanners are not adapting their attacks when...
Darling – Darwin/Mac OS Emulation Layer For Linux
Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git submodules, so a plain clone will not do. git clone --recurse-submodules https://github.com/darlinghq/darling.git Updating sources: git pull git submodule init git submodule update Prefixes Darling has support for DPREFIXes, which are very similar to WINEPREFIXes. They are virtual “chroot” environments with an macOS-like...
GhostTunnel – Backdoor Transmission Method That Can Be Used In An Isolated Environment
GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload agent, then the HID device can be removed after the payload is released. GhostTunnel use 802.11 Probe Request Frames and Beacon Frames to communicate and doesn't need to establish a wifi...
Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits
Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature is immediate exploit source download right in your working path. Utility was tested on a python2.6, python2.7, python3.6 with SQLite FTS4 support. If you have found any bugs, don't hesitate to open issue. Also Read Spykeyboard – Keylogger...
Spykeyboard – Keylogger Which Sends Us The Data To Our Gmail
Spykeyboard is a script which allows us to generate an undetectable keylogger which sends the captured keys to our gmail mail. Once we generated our keylogger in our kali linux we would have to pass the .py file to a windows machine to convert it to an .exe. The tool is in development. Also Read Crypton – Attacks On Various Encryption...
Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms
Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented with example challenges from "Capture The Flag" contests and...
Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248
Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect vulnerable versions of Telerik Web UI during passive scans. Bruteforce the key and discover the "Document Manager" link just like the original exploit tool. Requirements Locate Telerik.Web.UI.DialogHandler.aspx This extension requires Python's requests module. Just run pip install requests to install it. ...
SQLMap – SQL Injection & Database Automatic Takeover Tool
SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying...