Tools Category

PowerStager

A payload stager using PowerShell This script creates an executable stager that downloads a selected powershell payload, loads it into memory and executes it using obfuscated EC methods. The script will also encrypt the stager for dynamic signatures and some additional obfuscation. This enables the actual payload to be executed Read more…

Loading

Tools Category

Powershell Toolkit

Powershell Toolkit Collection PowerMemory: https://github.com/giMini/PowerMemory Exploit the credentials present in files and memory ReflectiveDLLInjection: https://github.com/stephenfewer/ReflectiveDLLInjection Reflective DLL injection is a library injection technique that is primarily used to perform the loading of a library from memory to host processes. The library should therefore be able to load itself by implementing Read more…

Loading

Shellstack

Manage All Your Backdoored Websites Efficiently   ShellStack is a PHP based backdoor management tool. This Tool comes handy for “HACKERS” who wish to keep a track of every website they hack. The tool generates a backdoor file which you just have to upload to the site and put the Read more…

Loading

Tools Category

Web Vulnerability Scan ( Metasploit )

Web Vulnerability Scan (WMAP) Introduce The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development. Its best-known sub-project is the open source[2] Metasploit Framework, a tool for developing and executing exploit code against a remote target machine. Read more…

Loading

Tools Category

Dagon – advanced hash cracking

Named after the prince of Hell, Dagon (day-gone) is a advanced hash cracking and manipulation system, capable of bruteforcing multiple hash types, creating bruteforce dictionaries, automatic hashing algorithm verification, random salt generation from unicode to ascii, and much more. What is Dagon? Dagon is an advanced hash cracking and hash manipulation system Read more…

Loading

TheFatRat

TheFatRat a Massive Exploiting Tool Revealed An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this Read more…

Loading

Tools Category

ssh_scan

prototype SSH configuration and policy scanner ssh_scan A SSH configuration and policy scanner Key Benefits Minimal Dependancies – Uses native Ruby and BinData to do its work, no heavy dependancies. Not Just a Script – Implementation is portable for use in another project or for automation of tasks. Simple – Read more…

Loading

Tools Category

ShodanHat

ShodanHat  (Search For Hosts Info)   Search For Hosts Info With Shodan. Dependencies You need to install shodan with pip install shodan or easy_install shodan. You need to install python-nmap with pip install python-nmap. You need to set your API Key in the ‘constantes.py’ file. Options -h, –help show this Read more…

Loading

Tools Category

Findsploit

ABOUT Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). For updates Read more…

Loading

Tools Category

EAPHammer

EAPHammer EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal Read more…

Loading