Xerxes : Dos Tool Enhanced with Many Features

0

Xerxes dos tool enhanced with many features for stress testing. It has many features, some of these features are: TLS SupportHTTP header randomizationUseragent randomizationMultiprocessing supportMultiple Attack vectorsetc... Not only that but also we are aggressively developing it and adding a lot more features and functionalities. Also Read - FreeVulnSearch : Script to Query Vulnerabilities via the cve-search.org API Usage $ ./Xerxes -H --====--./Xerxes {OPTIONS}Xerxes...

MXtract – Memory Extractor & Analyser

0

MXtract is an opensource Linux based tool that analyses and dumps memory. Its developed as an offensive pentration testing tool which can be used to scan memory for private keys, IP, and passwords using regexes. Remember your results are only as good as your regexes. In most Linux environments users can access the memory of processes, this allows...

RapidRepoPull : Quickly Pull & Install Repos from its List

0

RapidRepoPull goal is to quickly pull and install repos from its list. This program uses Python to clone/maintain multiple security related repos using threading and multiprocessing. Use cases Quickly install your favorite Security repos on a new systemKick off multiple concurrent git clone tasks utilizing PythonAdd remove repos to the worker_data list as needed in order to address indivudual use case/project...

Goscan : Interactive Network Scanner

0

GoScan is an interactive network scanner client, featuring auto-completion, which provides abstraction and automation over nmap. Although it started as a small side-project I developed in order to learn @golang, GoScan can now be used to perform host discovery, port scanning, and service enumeration not only in situations where being stealthy is not a priority and time is limited (think...

DNSDmpstr : Unofficial API & Client for DnsDumpster & HackerTarget

0

DNSDmpstr is an unofficial API & Client for DNS Dumpster and HackerTarget.com IP tools. DNS dumpster is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process. Also Read - Metaforge : An OSINT Metadata Analysing Tool that Filters Through Tags...

FreeVulnSearch : Script to Query Vulnerabilities via the cve-search.org API

0

This NMAP NSE script is part of the Free OCSAF project FreeVulnSearch. In conjunction with the version scan "-sV" in NMAP, the corresponding vulnerabilities are automatically assigned using CVE (Common Vulnerabilities and Exposures) and the severity of the vulnerability is assigned using CVSS (Common Vulnerability Scoring System). For more clarity, the CVSS are...

Remot3d : A Simple Tool Created for Large Pentesters

0

Remot3d is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors. A tool made to generate backdoor to control and exploit a server where the server runs the PHP (Hypertext Preprocessor) program. Equipped with a backdoor that has been Obfuscated which means that 100% FUD (FULLY UNDETECTABLE) in other...

Armory : A Tool Meant to Take in a Lot of External & Discovery Data

0

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information. It isn't meant to replace any specific tool. It is meant to take the output from various tools, and use it to feed other tools. Additionally, it is meant...

DOGE : Darknet Osint Graph Explorer

0

DOGE is a darknet Osint Graph Explorer, which is still in the development stage and you should use this in addtion to Darknet OSINT Transform. Query prototype: SELECT DISTINCT custom_column_name AS input, another_custom_name AS output FROM some_table, obviously you can add other options as WHERE, ORDER BY, etc. Also Read - Metaforge : An OSINT Metadata Analysing Tool that Filters...

Top Best Useful Commands for Kali Linux?

0

Linux administrators can't live by the graphical UI alone. That is the reason we've ordered helpful Linux commands into this advantageous guide. Kali Linux is a Debian inferred Linux circulation intended for computerized crime scene distribution and penetration testing. It comes with a lot of inbuilt hacking tools which can be used to hack websites and wireless networks. With just a few commands,...