Joomscan – OWASP Joomla Vulnerability Scanner Project
JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability assurance in Joomla CMS deployments. Implemented in Perl, this tool enables seamless and effortless scanning of Joomla installations, while leaving a minimal footprint with its lightweight and modular architecture. It not only detects known offensive...
Social Mapper – A Social Media Enumeration & Correlation Tool
Social Mapper is a Social Media Mapping Tool that correlates profiles via facial recognition by Jacob Wilkin(Greenwolf). Social Mapper is an Open Source Intelligence Tool that uses facial recognition to correlate social media profiles across different sites on a large scale. It takes an automated approach to search popular social media sites for targets names and pictures to accurately detect and...
Mr SIP : SIP-Based Audit and Attack Tool
Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help developing novel SIP-based DDoS attacks and defense approaches and then as an idea to convert it to a fully functional SIP-based penetration testing tool, it has been redeveloped into the current version. It was used in...
WarChild – Denial Of Service Testing Suite Made For Analyzing
Warchild is a denial of service testing suite made for analyzing the strength of your website against different kinds of denial of service attacks you will be facing which are mainly organized by crooks to cause damage to your website. WarChild Installation For Installing the required modules just run the following command in your terminal :) ...
Aron – A GO Script For Finding Hidden GET & POST Parameters
Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go get github.com/m4ll0k/printer # now check if $GOPATH is set $ go env | grep -i gopath # if $GOPATH not set, try with: $ export GOPATH=$HOME/go $ go run aron.go # OR $ go build aron.go $ cp aron /usr/bin/ $ aron Also Read...
Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages & UTF-8 Group
Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it and converting to ASCII. Features It's smarter version of confusable_homoglyphs: Autodect or manual choosing category (aliases from ISO 15924). Auto or manual load only needed alphabets in memory. Converting to ASCII. More configurable. More stable. Also Read Whatsapp_Automation...
CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates To Find Potential HostNames
CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or given a IP range it will attempt to extract host information from SSL Certificates. If you want to use Censys.io you need to register for a API key. Also Read Hcxdumptool – Small Tool To Capture...
Hcxdumptool – Small Tool To Capture Packets From WLAN Devices
Hcxdumptool is small tool to capture packets from wlan devices. After capturing, upload the "uncleaned" cap here to see if your application or the client is vulnerable by using common wordlists. Convert the cap to hccapx and/or to WPA-PMKID-PBKDF2 hashline (16800) with hcxpcaptool (hcxtools) and check if wlan-key or plainmasterkey was transmitted unencrypted. Stand-alone binary - designed to run on...
Whatsapp_Automation : Collection Of APIs Interact With WhatsApp Running In An Android Emulator
Whatsapp_Automation is a collection of APIs that interact with WhatsApp messenger running in an Android emulator, allowing developers to build projects that automate sending and receiving messages, adding new contacts and broadcasting messages multiple contacts. The project uses Selinium, Appium, Python and Android Virtual Device Emulator. Whatsapp_Automation Requirements java Android Studio & Android Emulator setup with latest Android version Appium...
Fragmentation Enables Massive Data Security Voids
A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature enough to ward off data threats. Yet, a greater percentage reported persistent challenges in safeguarding the same data. This fragmented approach to data security according to the study aggravates weaknesses and challenges persistent data protection. The study concluded that organizations...