BootStomp – A Bootloader Vulnerability Bug Finder
BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage vulnerabilities. BootStomp works with boot-loaders compiled for ARM architectures (32 and 64 bits both) and that results might slightly vary depending on angr and Z3's versions. Requirements angr $ pip install angr IDA PRO IDA Decompiler Run BootStomp...
Trape – Learn To Track The World & To Avoid Being Traced
Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies could monitor you, obtaining information beyond your IP. Also Read XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool Session Recognized Using Trape Facebook Twitter VK Reddit Gmail tumblr Instagram Github Bitbucket Dropbox Spotify PayPal Amazon Foursquare (new) ...
Anti-DDoS : Anti DDOS Bash Script To Defend Against DDOS Attacks
An open source project developed against the DOS and DDoS attack by writing iptables rules into the Linux OS is called the Anti-DDoS project. We need to make sure before implementing or executing the rules take all necessary defense configurations. The anti-DDoS project will work only on Linux OS, it will not provide 100% security, but it helps you to...
Blackeye – Complete Phishing Tool, With 32 Templates +1 Customizable
BLACKEYE is an upgrade from original ShellPhish tool by thelinuxchoice under GNU license. BLACKEYE is the most complete Phishing Tool, with 32 templates +1 customizable and it works only on LAN. Blackeye Usage git clone https://github.com/thelinuxchoice/blackeye cd blackeye bash blackeye.sh Also Read Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood Disclaimer This tool was made for educational purposes! Using BlackEye for attacking targets without prior mutual...
Rootstealer – Trick To Inject Commands On Root Terminal
Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject command with X11 lib. Rootstealer Installation # apt-get install libX11-dev libxtst-dev # cd rootstealer/sendkeys; Edit file rootstealer/cmd.cfg and write your command to inject. You can take that following: # make; cd .. #to back to path rootstealer/...
XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool
XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website or you can use this tool to Get Shells, Sends, Deface, cPanels & Databases. Currently tol is supported by CMS like WordPress, Joomla, Drupal, PrestaShop, and LokoMedia. Also Read Blind-Bash : Project To Obfuscate Your Bash Code XAttacker Installation Linux...
Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood
Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization proxy servers as bots. This script isn't all inclusive and you can't simply drop Pentagon/NSA/whatever site with only a solitary mouse click. Each attack is one of a kind, and for every site you'd have to look for vulnerabilities...
Raptor WAF – Web application firewall using DFA
Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It is widely use now a days for the following; Block XSS, SQL injection attacks and path traversal with Raptor. Use blacklist IPs to block some users at the config/blacjlist_ip.txt Use IPv6 and IPv4 at communications. ...
RouterSploit – Exploitation Framework For Embedded Devices
Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits - modules that take advantage of identified vulnerabilities creds - modules designed to test credentials against network services scanners - modules that check if a target is vulnerable to any exploit payloads - modules that are responsible for...
Blind-Bash : Project To Obfuscate Your Bash Code
Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide important things in your code. This tool will give you blind & strong code, but everyone has knowledge in bash script can DE-obfuscate this code. So this obfuscation not %100 secure, don't let important things in your...