Top 5 DDoS Attacking Tools For Linux,Windows & Android

0

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many computers are used to target same server in a distributed manner. Where DOS (Denial of Service Attack)  is one of most dangerous cyber attacks. It is a an attempt to reduces, restricts or prevents or blocks accessibility of resources to...

Pftriage : Python Tool & Library To Help Analyse Files During Malware Triage & Analysis

0

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view and extract properties of a file to help during the triage process. The tool also has an analyse function which can detect common malicious indicators used by malware. Also Read : ADAPT : Tool That Performs Automated Penetration Testing for WebApps Dependencies pefilefilemagic Note: On...

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

0

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes a Burp request file as input and a parameter to fuzz. Note : Server Side Request Forgery or SSRF is a vulnerability in which an attacker forces a server to perform requests on their behalf. Also...

LeakLooker : Find open databases with Shodan

0

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results from Shodan, excluding empty and compromised databases. Everything is sorted and presented in clickable way. Requirements Python 3Shodan paid plan, except Kibana search Put your Shodan API key in line 65 pip3 install shodanpip3 install coloramapip3 install hurry.filesize Also Read : CIRTKit : Tools...

Malice : VirusTotal Wanna Be – Now with 100% more Hipster

0

Malice mission is to be a free open source version of VirusTotal that anyone can use at any scale from an independent researcher to a fortune 500 company. Try It Out DEMO: demo.malice.ioUsername: malicePassword: ecilam Also Read : CIRTKit : Tools for the Computer Incident Response Team Installation $ brew install maliceio/tap/malice Usage: malice COMMAND Open Source Malware Analysis FrameworkVersion: 0.3.11Author:...

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

0

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed, and confidence in penetration testing efforts. ADAPT automatically tests for multiple industry standard OWASP Top 10 vulnerabilities, and outputs categorized findings based on these potential vulnerabilities. ADAPT also uses the functionality from OWASP ZAP to perform automated...

Pwndb : Search For Leaked Credentials

0

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name. Usage usage: pwndb.py optional arguments: -h, --help show this help message and exit --target TARGET Target email/domain to search for leaks. --list LIST ...

PF_RING : High-Speed Packet Processing Framework

0

PF_RING is a Linux kernel module and user-space framework that allows you to process packets at high-rates while providing you a consistent API for packet processing applications. Basically everyone who has to handle many packets per second. The term ‘many’ changes according to the hardware you use for traffic analysis. It can range from 80k pkt/sec on a...

CIRTKit : Tools for the Computer Incident Response Team

0

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the Viper Framework. Installation Database Setup lib/core/database.py It requires a database to store malware artifacts and investigation data. Currently, it is equipped to use SQLite and Postgres SQL databases. If you need to have multiple analysts collaborate on investigations, then you need...

Modlishka : A Flexible And Powerful Reverse Proxy Tool

0

Modlishka is a flexible and powerful reverse proxy, that will take your ethical phishing campaigns to the next level. It was realeased with an aim to: Help penetration testers to carry out an effective phishing campaign and reinforce the fact that serious threat can arise from phishing.Show current 2FA weaknesses, so adequate security solutions can be created and implemented soon.Raise...