Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling
Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep in transaction data to plot a graph out of the information. Orbit Usage Run orbit.py with python3 as follows python3 orbit.py Enter the wallet address __ | |...
Blackowl – Tool To Gather Information, Based On Operative-Framework
Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests pythonwhois beautifulsoup4 Also Read Scout2 – Security Auditing Tool For AWS Environments How To Use Blackowl $ git clone https://github.com/qqwaszx/blackowl.git ; cd blackowl $ pip install -r requirements.txt $ python main.py : blackowl > help Demo Modules /core/modules/ CMS Gathering : CMS Detection Email to...
Seeker – Find Device Information & Geo Location with High Accuracy
Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and Geo Location with High Accuracy. Seeker is an alternative best used when it's not possible to directly geolocate IP addresses. Seeker Hosts a fake website on Apache Server and uses Ngrok to generate a SSL link which asks for Location Permission and if the user allows it, we...
Camelishing – Social Engineering Tool
Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or Custom Payload), Return İnformation, Mail Open Track,Agent Open Track, AutoSave, Statistics Report and User Control. Camelishing is supported in windows 7 and 10. Camelishing Installation $ pip install -r requirements.txt $ Install Microsoft Office Also Read XSS-Payload-List : Cross Site...
Security Monkey – AWS & GCP Accounts For Alerts On Insecure Configurations
Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private clouds. It can also watch and monitor your GitHub organizations, teams, and repositories. It provides a single UI to browse and search through all of your accounts, regions, and cloud services. The monkey remembers previous states...
Scout2 – Security Auditing Tool For AWS Environments
Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual inspection and highlights high-risk areas automatically. Rather than pouring through dozens of pages on the web, Scout2 supplies a clear view of the attack surface automatically. Note: Scout2 is stable and actively maintained, but a number...
Hindsight – Tool For Analyzing Web Artifacts Chrome Browser & Chromium-Based Applications
Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded to support other Chromium-based applications (with more to come!). Hindsight can parse a number of different types of web artifacts, including URLs, download history, cache records, bookmarks, autofill records, saved passwords, preferences, browser extensions, HTTP...
Joomscan – OWASP Joomla Vulnerability Scanner Project
OWASP JoomScan is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them. If you want to do a penetration test on a Joomla CMS, OWASP JoomScan is Your best shot ever! This Project is being faster than ever and updated with the latest Joomla vulnerabilities. Installation git clone https://github.com/rezasp/joomscan.git cd joomscan perl joomscan.p Also Read CuckooDroid – Automated Android...
WSSAT – Web Service Security Assessment Tool
WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing its configuration files. This tool accepts WSDL address list as input file and for each service, it performs both static and dynamic tests against the security vulnerabilities. It also makes information disclosure controls. With this...
XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List
XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites. XSS attacks occur when an attacker uses a web application to send malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed...