Aircrack-NG : Complete Suite Tools To Assess WiFi Network Security

0

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export of data to text files for further processing by third party tools. Attacking: Replay attacks, DE-authentication, fake access points and others via packet injection. Testing: Checking WiFi cards and driver capabilities (capture and injection). ...

PureBlood – A Penetration Testing Framework created for Hackers / Pentester / Bug Hunter

0

PureBlood is a tool for penetration testing framework created for Hackers / Pentester / Bug Hunter. Thanks to Cr4sHCoD3 for developing the tool. Also Read Dejavu – Open Source Deception Framework Web Pentest Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page...

Cloudmapper – Tool Helps To Analyze Your AWS Environments

0

CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser. It now contains more functionality. Click here for the demo. Also Read Frisky – Tools To Assist Binary App Reversing & Augmentation Installation Requirements: pip and virtualenv You will also need jq and the library pyjq, which require some...

Armory – Tool To Take Lot Of External & Discovery Data

0

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information. It isn't meant to replace any specific tool. It is meant to take the output from various tools, and use it to feed other tools. Additionally, it is meant...

Rootless Jailbreakd – Jailbreakd Offering Some More Functionality To The Jailbreak

0

Rootless Jailbreakd is A small jailbreakd offering some more functionality to the jailbreak. Uses CPDisctributedMessageCenter. To compile you need theos (why? cus why not? and I like theos. If you're smart enough you can still compile it manually very easily so yeah) Also Read whatweb – Tool to Discover Security Vulnerabilities With Your Web Application Setup Rootless Jailbreakd Grab AppSupport headers and...

Frisky – Tools To Assist Binary App Reversing & Augmentation

0

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested on iOS 11.1.2 and macOS 10.12.6. frida-url-interceptor.js(Frisky) Intercepts all URLs of an iOS/macOS application, allowing you to trace and alter/intercept all network traffic, including https, per app before encryption and after decryption: iOS: open app of interest...

Dejavu – Open Source Deception Framework

0

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can be a useful arsenal for blue teams to detect attacks at very early stage of cyber kill chain. But the challenge we have seen is deploying, managing and administering decoys across large networks is still...

Delta – SDN Security Evaluation & Penetration Testing Framework

0

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown security problems in SDN by employing a fuzzing technique. Agent-Manager is the control tower. It takes full control over all the agents deployed to the target SDN network. Application-Agent is a legitimate SDN application that...

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

0

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks and the PowerShell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18. Usage is simple, just run Magic Unicorn (ensure Metasploit is installed if using Metasploit methods and in the right path)...

Onion nmap To Scan Hidden Onion Services

0

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and dnsmasq are keep running as daemons by means of s6, and proxychains wraps nmap to utilize the Tor SOCKS intermediary on port 9050. Tor is likewise designed through DNSPort to secretly resolve DNS solicitations to port...