Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable

0

BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1 customizable and it works only on LAN. Blackeye Usage git clone https://github.com/thelinuxchoice/blackeye cd blackeye bash blackeye.sh Also Read Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood Disclaimer This tool was made for educational purposes! Using BlackEye for attacking targets without prior mutual...

Rootstealer – Trick To Inject Commands On Root Terminal

0

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject command with X11 lib. Rootstealer Installation # apt-get install libX11-dev libxtst-dev # cd rootstealer/sendkeys; Edit file rootstealer/cmd.cfg and write your command to inject. You can take that following: # make; cd .. #to back to path rootstealer/...

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

0

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website or you can use this tool to Get Shells, Sends, Deface, cPanels & Databases. Currently tol is supported by CMS like WordPress, Joomla, Drupal, PrestaShop, and LokoMedia. Also Read Blind-Bash : Project To Obfuscate Your Bash Code XAttacker Installation Linux...

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

0

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization proxy servers as bots. This script isn't all inclusive and you can't simply drop Pentagon/NSA/whatever site with only a solitary mouse click. Each attack is one of a kind, and for every site you'd have to look for vulnerabilities...

Raptor WAF – Web application firewall using DFA

0

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It is widely use now a days for the following; Block XSS, SQL injection attacks and path traversal with Raptor. Use blacklist IPs to block some users at the config/blacjlist_ip.txt Use IPv6 and IPv4 at communications. ...

RouterSploit – Exploitation Framework For Embedded Devices

0

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits - modules that take advantage of identified vulnerabilities creds - modules designed to test credentials against network services scanners - modules that check if a target is vulnerable to any exploit payloads - modules that are responsible for...

Blind-Bash : Project To Obfuscate Your Bash Code

0

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide important things in your code. This tool will give you blind & strong code, but everyone has knowledge in bash script can DE-obfuscate this code. So this obfuscation not %100 secure, don't let important things in your...

Joomscan – OWASP Joomla Vulnerability Scanner Project

0

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability assurance in Joomla CMS deployments. Implemented in Perl, this tool enables seamless and effortless scanning of Joomla installations, while leaving a minimal footprint with its lightweight and modular architecture. It not only detects known offensive...

Social Mapper – A Social Media Enumeration & Correlation Tool

0

Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool that uses facial recognition to correlate social media profiles across different sites on a large scale. It takes an automated approach to search popular social media sites for targets names and pictures to accurately detect and...

Mr SIP : SIP-Based Audit and Attack Tool

0

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches and then as an idea to convert it to a fully functional SIP-based penetration testing tool, it has been redeveloped into the current version. It was used in...