WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack
WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man In The Middle attack, however the rundown of highlights is very expansive. Also Read Androl4b – Android Security Virtual Machine Installation WiFi-Pumpkin Python 2.7 git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git cd WiFi-Pumpkin ./installer.sh --install or download .deb file to install sudo dpkg -i...
Androl4b – Android Security Virtual Machine
AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security nerds and researchers for reverse engineering and malware analysis. Changes in Androl4b v.3? Tools are updated New tools and lab added Upgraded to Ubuntu mate 17.04 Some cleanup Also Read Onion nmap To Scan Hidden Onion Services Example Tools Radare2...
CloudFrunt Tool For Identifying Misconfigured CloudFront Domains
CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients make "distributions" that serve content from particular sources (an S3 container, for instance). Each CloudFront distribution has a remarkable endpoint for clients to point their DNS records to (ex. d111111abcdef8.cloudfront.net). The greater part of the areas...
Microsoft Windows Hacking Pack – WHP
Tools here for Windows Hacking Pack are from different sources. The repo is generally licensed with WTFPL, but some content may be not (eg. sysinternals). "pes" means "PE Scambled". It's useful sometimes. Remote Exploits For Windows Hacking Pack ========================================= Windows 2000 / XP SP1 MS05-039 Microsoft Plug and Play Service Overflow, Works with SSDP too http://www.rapid7.com/db/modules/exploit/windows/smb/ms05_039_pnp Windows XP/NT (beofre SP2) MS03-026 Microsoft RPC DCOM Interface...
Bad-PDF To Steal NTLM Hashes From Windows Machines
Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record. Bad-Pdf peruses the NTLM hashes utilizing Responder listener. This strategy deal with all PDF readers(Any version) and java scripts are not required for this attack. Reference : https://research.checkpoint.com/ntlm-credentials-theft-via-pdf-files/ Also Read EggShell – Remote Administration Tool For iOS/macOS Dependency To Steal...
EggShell – Remote Administration Tool For iOS/macOS
EggShell is a post misuse surveillance instrument written in Python. It gives you a command line session with additional usefulness amongst you and an objective machine. EggShell gives you the power and convenience of uploading/downloading records, tab completion, taking pictures, location tracking, shell command execution, persistence, escalating privileges, password retrieval, and much more. This is venture is a proof...
Drozer – Android Leading Security Testing Framework
Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and devices by expecting the part of an application and cooperating with the Dalvik VM, other applications' IPC endpoints and the basic OS. It gives apparatuses to enable you to utilize, share and comprehend open Android abuses....
AutoNSE – Massive NSE AutoSploit and AutoScanner
Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and adaptable features. It enables clients to compose (and share) basic scripts (utilizing the Lua programming dialect ) to computerize a wide variety of networking tasks. Those contents are executed in parallel with the speed and effectiveness you anticipate from...
WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack
WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In The Middle attack, but the list of features is quite broad. Installation - WiFi-Pumpkin Python 2.7 git clone https://github.com/P0cL4bs/WiFi-Pumpkin.git cd WiFi-Pumpkin ./installer.sh --install Features Rogue Wi-Fi Access Point. Deauth Attack Clients AP. Probe Request Monitor. DHCP Starvation Attack. Credentials Monitor. Transparent Proxy. ...
Hack Windows Installer For The Hack Typeface
Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts, there is justifiable reason explanation behind this on the Windows platform. Various things can turn out badly when one tries to install or update every now and again updated fonts manually. This installer tends to about...