Tools Category

ShodanHat

ShodanHat  (Search For Hosts Info)   Search For Hosts Info With Shodan. Dependencies You need to install shodan with pip install shodan or easy_install shodan. You need to install python-nmap with pip install python-nmap. You need to set your API Key in the ‘constantes.py’ file. Options -h, –help show this Read more…

Loading

Tools Category

Findsploit

ABOUT Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically compile and run any C exploit (ie. ./copysploit 1337.c && ./compilesploit 1337.c). For updates Read more…

Loading

Tools Category

EAPHammer

EAPHammer EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope wireless assessments and red team engagements. As such, focus is placed on providing an easy-to-use interface that can be leveraged to execute powerful wireless attacks with minimal Read more…

Loading

Tools Category

redsnarf (red-teaming tool for Windows )

red-teaming tool for Windows (pen-testing)     RedSnarf is a pen-testing / red-teaming tool by Ed William and Richard Davy for retrieving hashes and credentials from Windows workstations, servers and domain controllers using OpSec Safe Techniques. See our YouTube Channel for Videos https://www.youtube.com/channel/UCDGWRxpHo6d8y6qIeMAXnxQ RedSnarf functionality includes: • Retrieval of local Read more…

Loading

Tools Category

CloudFail

Find hidden IP’s behind the CloudFlare network     CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by CloudFlare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has Read more…

Loading