Tools Category

Fluxion (wi-fi hack)

Fluxion Hack WPA/WPA2 Security Without Brute Force   Fluxion script has been available for a while and is most apt for security researchers and pentesters to test their network security by hacking WPA/WPA2 security without brute forcing it. Fluxion is based on another script called linset. Fluxion is not much different from Read more…

Loading

Tools Category

Cowrie

Cowrie SSH/Telnet Honeypot   Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. Cowrie is developed by Michel Oosterhof Features Some interesting features: Fake filesystem with the ability to add/remove files. A full fake filesystem resembling Read more…

Loading

Tools Category

Brosec

Brosec   Overview (tl;dr) Brosec is a terminal based reference utility designed to help us infosec bros and broettes with useful (yet sometimes complex) payloads and commands that are often used during work as infosec practitioners. An example of one of Brosec’s most popular use cases is the ability to Read more…

Loading

Tools Category

googler

googler Google Search, Google Site Search, Google News from the terminal Demo Video googler is a power tool to Google (Web & News) and Google Site Search from the command-line. It shows the title, URL and abstract for each result, which can be directly opened in a browser from the Read more…

Loading

Tools Category

scanless

scanless Public Port Scan Scraper   scanless Command-line utility for using websites that can perform port scans on your behalf. Useful for early stages of a penetration test or if you’d like to run a port scan on a host and have it not come from your IP address. scanless Read more…

Loading

Tools Category

Create SSH BruteForcer in Python

Create SSH BruteForcer in Python In cryptography, a brute-force attacks consists of an attacker trying many passwords or passphrases with the hope of eventually guessing correctly. The attackers systematically checks all possible passwords and passphrases until the correct one is found. Alternatively, the attackers can attempt to guess the key Read more…

Loading

Tools Category

Brutal

Brutal A Toolkit To Create Various HID Attacks Brutal is a simple toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device. It is used on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ). When you insert the Read more…

Loading

Tools Category

Veil 3.0

Veil 3.0 Antivirus evasion and evading detection   The Veil-Framework is a collection of red team security tools that implement various attack methods focused on antivirus evasion and evading detection. Antivirus ‘solutions’ don’t often catch the bad guys, but they do often catch pen-testing during assignment. This tool came about Read more…

Loading

Tools Category

KickThemOut

KickThemOut KickThemOut – Kick Devices Off Your Network A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific or all devices and ARP spoofs them off your local area network. Compatible with Python 2.6 & 2.7. Installation You Read more…

Loading