Search the Community

Showing results for tags 'penetration'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 32 results

  1. Mobile Application Penetration Testing Cheat Sheet The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics and checklist, which is mapped OWASP Mobile Risk Top 10 for conducting pentest. [Hidden Content]
  2. Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. v5.0.57 Add *nix Gather Grub Password module Make suggested changes to grub_password module More… [HIDE][Hidden Content]]
  3. ehtools framework Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that can be explored easily from within it. This powerful and simple tool can be used for everything from installing new add-ons to grabbing a WPA handshake in a matter of seconds. Plus, it’s easy to install, set up, and utilize. Attacking frameworks Most new Wi-Fi hacking tools rely on many of the same underlying attacks, and scripts that automate using other more familiar tools like Aireplay-ng are often referred to as frameworks. These frameworks try to organize tools in smart or useful ways to take them a step beyond the functionality or usability of the original program. An excellent example of this are programs that integrate scanning tools like Airodump-ng, attacks like WPS Pixie-Dust, and cracking tools like Aircrack-ng to create an easy-to-follow attack chain for beginners. Doing this makes the process of using these tools easier to remember and can be seen as sort of a guided tour. While each of these attacks is possible without the hand-holding, the result can be faster or more convenient than trying to do so yourself. An example of this we’ve covered is the Airgeddonframework, a wireless attack framework that does useful things like automating the target selection process and eliminating the time a user spends copying and pasting information between programs. This saves valuable time for even experienced pentesters but has the disadvantage of preventing beginners from understanding what’s happening “under the hood” of the attack. While this is true, most of these frameworks are fast, efficient, and dead simple to use, enabling even beginners to take on and disable an entire network. Changelog v3.0 EPP updated to v4.0 Added EPP Crypto v1.4 Added login and password encryption Added KDE konsole support! Added ehtools application and ehtapp utility Added a new utility named ehtkey (ehtools key) Updated ehtmod (ehtools modules) Updated Modules to v1.9 and renamed to ehtmod Updated ehtools (now you can stable login to ehtools) Fixed EHT-2019-02776 (nologin) vulnerability! Updated epasswd (now you can change login/password) Removed $EPATH firmware commander shell Removed ehtools update helper (euh) Added snapshots (more information in README.md/Utilities) On this version you can turn off ehtools password protection! Updated ehtools/install.sh and epasswd utility! Added arissploit option! Added ehtools simple shell option! Added reboot and shutdown options! Added update APT sources option! Added some new features to main menu! Updated ehtools PRO UX/UI Impruvements Updated ehtools LITE UX/UI Impruvements [HIDE][Hidden Content]]
  4. Introduction The Metasploit Framework is an open source Ruby-based penetration testing and development platform, developed by the open source community and Rapid7, that provides you with access to the huge number of exploits, payloads, shellcodes, encoders, fuzzing tools, and much more. Metasploit Framework (Rapid7) Metasploit Framework: The Most Used Penetration Testing Framework Metasploit Framework can be used to test security vulnerabilities, enumerate networks, execute attacks, and evade detection. It simply helps you to find, exploit, and validate vulnerabilities. If you are a pentester, cybersecurity researcher, tester, programmer or freestyler, the Metasploit Framework is all you need. Can be used for both legitimate and unauthorized activities, but we’re strongly suggest you to behave, and use this awesome pentesting framework to test your systems, help attack prevention and rise cybersecurity awareness. [HIDE][Hidden Content]]
  5. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. v5.0.53 Adding post module for dumping credentials out of NagiosXI Add docuentation for auxiliary/scanner/http/wordpress_scanner Add documentation for wp_dukapress_file_read scanner Land #12443 Fix Python reverse_http/s More… [Hidden Content]
  6. About Pentest Tools Framework INFO: Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities. Modules EXPLOIT ========= Exploit Name Rank Description -------------- ------- ------------- exploit/inject_html normal Inject Html code in all visited webpage exploit/robots normal robots.txt Detected exploit/jenkins_script_console good Jenkins-CI Script-Console Java Execution exploit/php_thumb_shell_upload good php shell uploads exploit/cpanel_bruteforce normal cpanel bruteforce exploit/joomla_com_hdflayer manual joomla exploit hdflayer exploit/wp_symposium_shell_upload good symposium shell upload exploit/joomla0day_com_myngallery good exploits com myngallery exploit/jm_auto_change_pswd normal vulnerability exploit/android_remote_access expert Remote Acces Administrator (RAT) exploit/power_dos manual Denial Of Service exploit/tp_link_dos normal TP_LINK DOS, 150M Wireless Lite N Router, Model No. TL-WR740N exploit/joomla_com_foxcontact high joomla foxcontact exploit/joomla_simple_shell high joomla simple shell exploit/joomla_comfields_sqli_rce high Joomla Component Fields SQLi Remote Code Execution exploit/inject_javascript normal Inject Javascript code in all visited webpage exploit/dns_bruteforce high Dns Bruteforce with nmap exploit/dos_attack normal hping3 dos attack exploit/shakescreen high Shaking Web Browser content exploit/bypass_waf normal bypass WAf exploit/enumeration high simple enumeration exploit/restrict_anonymous normal obtain credentials exploit/vbulletin high vBulletin v5.x 0day pre-auth RCE exploit exploit/openssl_heartbleed high dump openssl_heartbleed exploit/samba good Samba EXploits exploit/webview_addjavascriptinterface good Android Browser and WebView addJavascriptInterface Code Execution SCANNERS ======== Scanner Name Rank Description -------------- ------- ------------- scanner/ssl_scanning good SSL Vulnerability Scanning scanner/nmap_scanner normal port scanners nmap scanner/smb_scanning good scan vulnerable SMB server scanner/joomla_vulnerability_scanners high vulnerability scanner/joomla_scanners_v.2 good joomla scaning scanner/joomla_scanners_v3 normal joomla scaning scanner/jomscan_v4 good scan joomla scanner/joomla_sqli_scanners high vulnerability scanners scanner/lfi_scanners good lfi bug scan scanner/port_scanners manual port scan scanner/dir_search high directory webscan scanner/wordpress_user_scan good get wordpress username scanner/cms_war high FULL SCAN ALL WEBSITES scanner/usr_pro_wordpress_auto_find good find user pro vulnerability scanner/nmap_vuln normal vulnerability Scanner scanner/xxs_scaner normal Detected vulnerability xss scanner/spaghetti high Web Application Security Scanner scanner/dnslookup normal dnslookup scan scanner/domain_map normal scanner domain map scanner/dns_report normal dns report scanner/find_shared_dns normal find shared dns scanner/dns_propagation low dns propagation scanner/find_records normal find records scanner/cloud_flare normal cloud flare scanner/extract_links normal links extract scanner/web_robot normal web robots scanner scanner/enumeration normal http-enumeration [Hidden Content]
  7. Installed Tools Active Directory Tools Remote Server Administration Tools (RSAT) SQL Server Command Line Utilities Sysinternals Command & Control Covenant PoshC2 WMImplant WMIOps Developer Tools Dep Git Go Java Python 2 Python 3 (default) Ruby Ruby Devkit Visual Studio 2017 Build Tools (Windows 10) Visual Studio Code Evasion CheckPlease Demiguise DefenderCheck DotNetToJScript Invoke-CradleCrafter Invoke-DOSfuscation Invoke-Obfuscation Invoke-Phant0m Not PowerShell (nps) PS>Attack PSAmsi Pafishmacro PowerLessShell PowerShdll StarFighters Exploitation ADAPE-Script API Monitor CrackMapExec CrackMapExecWin DAMP EvilClippy Exchange-AD-Privesc FuzzySec’s PowerShell-Suite FuzzySec’s Sharp-Suite Generate-Macro GhostPack Rubeus SafetyKatz Seatbelt SharpDPAPI SharpDump SharpRoast SharpUp SharpWMI GoFetch Impacket Invoke-ACLPwn Invoke-DCOM Invoke-PSImage Invoke-PowerThIEf Kali Binaries for Windows LuckyStrike MetaTwin Metasploit Mr. Unikod3r’s RedTeamPowershellScripts NetshHelperBeacon Nishang Orca PSReflect PowerLurk PowerPriv PowerSploit PowerUpSQL PrivExchange Ruler SharpExchangePriv SharpExec SpoolSample UACME impacket-examples-windows vssown Information Gathering ADACLScanner ADExplorer ADOffline ADRecon BloodHound dnsrecon Get-ReconInfo GoWitness Nmap PowerView Dev branch included SharpHound SharpView SpoolerScanner Networking Tools Citrix Receiver OpenVPN Proxycap PuTTY Telnet VMWare Horizon Client VMWare vSphere Client VNC-Viewer WinSCP Windump Wireshark Password Attacks ASREPRoast CredNinja DSInternals Get-LAPSPasswords Hashcat Internal-Monologue Inveigh Invoke-TheHash KeeFarce KeeThief LAPSToolkit MailSniper Mimikatz Mimikittenz RiskySPN SessionGopher Reverse Engineering DNSpy Flare-Floss ILSpy PEview Windbg x64dbg Utilities 7zip Adobe Reader AutoIT Cmder CyberChef Gimp Greenshot Hashcheck Hexchat HxD Keepass MobaXterm Mozilla Thunderbird Neo4j Community Edition Pidgin Process Hacker 2 SQLite DB Browser Screentogif Shellcode Launcher Sublime Text 3 TortoiseSVN VLC Media Player Winrar yEd Graph Tool Vulnerability Analysis AD Control Paths Egress-Assess Grouper2 NtdsAudit zBang Web Applications Burp Suite Fiddler Firefox OWASP Zap Subdomain-Bruteforce Wordlists FuzzDB PayloadsAllTheThings SecLists Changelog v2.0 Added Kali Linux [Hidden Content] Added Docker [Hidden Content] #88 Added SpiderFoot [Hidden Content] #84 Added Amass [Hidden Content] Added customization support #42, #25 [HIDE][Hidden Content]]
  8. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. [Hidden Content]
  9. Automation for internal Windows Penetration Testing. 1) Automatic Proxy Detection 2) Elevated or unelevated Detection 3) Forensic Mode oder Pentest Mode a. Forensik -> Loki + PSRECON + Todo: Threathunting functions b. Pentest -> Internal Windows Domain System i. Inveigh NBNS/SMB/HTTPS Spoofing ii. Local Reconing -> Hostenum, SessionGopher, FileSearch, PSRecon iii. Domain Reconing -> GetExploitableSystems, Powerview functions, ACL-Analysis, ADRecon 1) Todo: Grouper for Group Policy overview iv. Privilege Escalation -> Powersploit (Allchecks), GPP-Passwords, MS-Exploit Search (Sherlock), WCMDump, JAWS v. Lazagne Password recovery vi. Exploitation -> Kerberoasting, Mimikittenz, Mimikatz with Admin-rights vii. LateralMovement -> FindLocalAdminAccess 1) Invoke-MassMimikatz || Powershell Empire Remote Launcher Execution over WMI 2) DomainPasswordspray viii. Share Enumeration ix. FindGPOLocation –> Search for user/group rights x. Find-Fruit Changelog v1.1 This version contains mainly new features. The execution of various C# binaries in memory, GPO audit functions, various new local recon checks, and domain checks. Just Import the Modules with: Import-Module .\WinPwn.ps1 or iex (new-object net.webclient).downloadstring(‘[Hidden Content]) For AMSI Bypass use the following oneliner: iex (new-object net.webclient).downloadstring(‘[Hidden Content]) [HIDE][Hidden Content]]
  10. The Metasploit Project is a computer security project which provides information about security vulnerabilities and aids in penetration testing and IDS signature development. It is a penetration testing platform that enables you to find, exploit, and validate vulnerabilities. The platform includes the Metasploit Framework and its commercial counterparts, such as Metasploit Pro. [HIDE][Hidden Content]]
  11. Installed Tools Active Directory Tools Remote Server Administration Tools (RSAT) SQL Server Command Line Utilities Sysinternals Command & Control Covenant PoshC2 WMImplant WMIOps Developer Tools Dep Git Go Java Python 2 Python 3 (default) Ruby Ruby Devkit Visual Studio 2017 Build Tools (Windows 10) Visual Studio Code Evasion CheckPlease Demiguise DefenderCheck DotNetToJScript Invoke-CradleCrafter Invoke-DOSfuscation Invoke-Obfuscation Invoke-Phant0m Not PowerShell (nps) PS>Attack PSAmsi Pafishmacro PowerLessShell PowerShdll StarFighters Exploitation ADAPE-Script API Monitor CrackMapExec CrackMapExecWin DAMP EvilClippy Exchange-AD-Privesc FuzzySec’s PowerShell-Suite FuzzySec’s Sharp-Suite Generate-Macro GhostPack Rubeus SafetyKatz Seatbelt SharpDPAPI SharpDump SharpRoast SharpUp SharpWMI GoFetch Impacket Invoke-ACLPwn Invoke-DCOM Invoke-PSImage Invoke-PowerThIEf Kali Binaries for Windows LuckyStrike MetaTwin Metasploit Mr. Unikod3r’s RedTeamPowershellScripts NetshHelperBeacon Nishang Orca PSReflect PowerLurk PowerPriv PowerSploit PowerUpSQL PrivExchange Ruler SharpExchangePriv SharpExec SpoolSample UACME impacket-examples-windows vssown Information Gathering ADACLScanner ADExplorer ADOffline ADRecon BloodHound dnsrecon Get-ReconInfo GoWitness Nmap PowerView Dev branch included SharpHound SharpView SpoolerScanner Networking Tools Citrix Receiver OpenVPN Proxycap PuTTY Telnet VMWare Horizon Client VMWare vSphere Client VNC-Viewer WinSCP Windump Wireshark Password Attacks ASREPRoast CredNinja DSInternals Get-LAPSPasswords Hashcat Internal-Monologue Inveigh Invoke-TheHash KeeFarce KeeThief LAPSToolkit MailSniper Mimikatz Mimikittenz RiskySPN SessionGopher Reverse Engineering DNSpy Flare-Floss ILSpy PEview Windbg x64dbg Utilities 7zip Adobe Reader AutoIT Cmder CyberChef Gimp Greenshot Hashcheck Hexchat HxD Keepass MobaXterm Mozilla Thunderbird Neo4j Community Edition Pidgin Process Hacker 2 SQLite DB Browser Screentogif Shellcode Launcher Sublime Text 3 TortoiseSVN VLC Media Player Winrar yEd Graph Tool Vulnerability Analysis AD Control Paths Egress-Assess Grouper2 NtdsAudit zBang Web Applications Burp Suite Fiddler Firefox OWASP Zap Subdomain-Bruteforce Wordlists FuzzDB PayloadsAllTheThings SecLists Changelog 1.3 Added RottenPotatoNG [Hidden Content] #63 Added Juicy Potato [Hidden Content] #63, #64 Added Watson [Hidden Content] #64 Added PwndPasswordsNTLM [Hidden Content] #67 Added FOCA [Hidden Content] #71 Added Vulcan [Hidden Content] Added SharpClipHistory [Hidden Content] Added NetRipper [Hidden Content] Added RobotsDisallowed [Hidden Content] Added Probable-Wordlists [Hidden Content] Added SharpSploit [Hidden Content] Changed WinRM configuration #65 Un-hardened UNC file paths #68 Fixed install issues with Covenant #61, #76 [HIDE][Hidden Content]]
  12. What is Osmedeus? It allows you to do boring stuff in Pentesting automatically like reconnaissance and scanning the target by run the collection of awesome tools. Feature Subdomain Scan. Subdomain TakeOver Scan. Screenshot the target. Basic recon like Whois, Dig info. Web Technology detection. IP Discovery. CORS Scan. SSL Scan. Wayback Machine Discovery. URL Discovery. Headers Scan. Port Scan. Vulnerable Scan. Seperate workspaces to store all scan output and details logging. REST API. React Web UI. Support Continuous Scan. Slack notifications. Available modules with list tool being used Subdomain Scanning amass subfinder massdns Subdomain TakeOver Scanning subjack SubOver Screenshot the target aquatone EyeWitness Port Scanning masscan nmap Vulnerable Scan and beautify html report nmap-vulners nmap-bootstrap-xsl Git repo scanning truffleHog gitrob Doing some stuff with Burp State file sqlmap SleuthQL LinkFinder Directory search dirhunt dirsearch gobuster Bruteforce services brutespray Wordlists domain web-content Changelog v1.4 Adding new AssetFinding module powered mostly by tomnomnom. Direct mode (specific module) now very powerful Detail. Improve the API architecture, from now you can run multi targets without crash the routine. Improve main routine and add options for custom speed of the routine. Adding some security feature for the API. Improve search and sort from the UI. Fix a lot of bugs and refactoring a lot of things. [Hidden Content]
  13. BackBox Linux is a penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit. It includes some of the most commonly known/used security and analysis tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation. It has been built on Ubuntu core system yet fully customized, designed to be one of the best Penetration testing and security distribution and more. As usual, this major release includes many updates. These include new kernel, updated tools and some structural changes with a focus on maintaining stability and compatibility with Ubuntu 18.04 LTS. What’s new Updated Linux Kernel 4.18 Updated desktop environment Updated hacking tools Updated ISO Hybrid with UEFI support System requirements 32-bit or 64-bit processor 1024 MB of system memory (RAM) 10 GB of disk space for installation Graphics card capable of 800×600 resolution DVD-ROM drive or USB port (3 GB) The ISO images for both 32bit & 64bit can be downloaded from the official web site download section: [HIDE][Hidden Content]]
  14. Learn Website Hacking / Penetration Testing From Scratch Learn Website Hacking / Penetration Testing From Scratch Free Udemy Course *ONLINE* Full course name: "Learn Website Hacking / Penetration Testing From Scratch" [HIDE][Hidden Content]]
  15. [HIDE][Hidden Content]] What is Dracos? Dracos is Penetration OS from Indonesian and the system built based on LFS / Linux From Scratch. Dracos is a lightweight linux because for desktop use DWM (Dynamic Window Manager) and suitable for Pentester. Dracos environment almost all using CLI (Command Line Interface), Why? Because to familiarize the user using CLI and easy to used. Curently Dracos has reached version 2.0 Codename Leak and previous version is 1.0 Codename Vairusa. Dracos don’t have package manager, but the next version will be present called Venomizer. Lightweight and Powerful Penetration Testing OS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools including information gathering, forensics, malware analysis, mantaining access, and reverse engineering. Open Source Everyone can use, copy, study, modify, and redistribute. Performance Dracos is built to be fast, strong, and powerfull OS. Safe & Secure We don't collect any your sensitive personal data. Security Tools Dracos Linux provides to penetration testing and packed with a ton of security tools including : Information gathering Vulnerability Assessment Exploitation Testing Wireless, Bluetooth & Radio Attack Social Engineering MITM / Man In The Middle Attack Stress Testing Forensics Malware Analysis Maintaining Access Reverse Engineering Covering Track Etc
  16. dEEpEst

    ​What is penetration testing

    [Hidden Content]
  17. Version 1.0.0

    3 downloads

    Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) 22 Tutorial Videos __________________________________ You can download them for free if you are a PRIV8 user

    $100.00 PRIV8

  18. View File Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) Learn Wi-Fi Password Penetration Testing (WEP/WPA/WPA2) 22 Tutorial Videos __________________________________ You can download them for free if you are a PRIV8 user Submitter dEEpEst Submitted 05/05/19 Category Libro Online Password ********  
  19. Metasploit The Penetration Testers Guide [Hidden Content]
  20. This E-book is for the people who considered as an advance pentester and was wanting to do more pentesting with Kali Linux. Be aware, this book is for advance users so if you are not familiar with Kali Linux for the most part, don't read this ebook (maybe) [HIDE][Hidden Content]]
  21. Introduction Pentoo Linux is a Live CD and Live USB, based on Gentoo Linux and designed for penetration testing and security assessment. Therefore, it contains plenty of security-focused and pentesting tools. If you’re looking for Kali Linux or BlackArch alternative, Pentoo Linux might be the right choice for you since it brings a rich hacking software repository for your daily security and hacking tasks. In addition, it’s available for both 32 bit and 64 bit architecture. Pentoo Linux might not be the most beginner-friendly distribution, but for all linux enthisiastics it’ll be adventurous voyage for sure. When it come to the Pentoo flavors, you have to choose between two main: hardened, default or i686. Give this Gentoo Linux Overlay a chance and see how it’ll work for you. Pentoo 2019.0 Current Features : Full UEFI including secure boot support Unetbootin et al support, including "Ubuntu only" changes saving OpenCL Enhanced cracking software including John The Ripper and Hashcat Kernel 4.20.2 and all needed patches for injection including the latest 802.11ac drivers XFCE 4.12 Full tools list to the right -> All the latest tools and a responsive development team! [HIDE][Hidden Content]]
  22. A penetration testing framework for UNIX systems. Introduction DarkSpiritz is a penetration testing framework for Linux, MacOS and Windows systems, created by SecTel Team. Users familiar with another penetration testing framework known as Metasploit, will find DarkSpiritz very easy to setup and use. Features: Python 3 support Real Time Updating of Configuration Never a need to restart the program even when adding plugins or editing them. Easy to use UX Multi-functionality [HIDE][Hidden Content]]
  23. Download: [HIDE][Hidden Content]] This repository has not been analyzed, run the app's in a secure environment.
  24. A project by Offensive Security The Kali NetHunter is an Android penetration testing platform targeted towards Nexus and OnePlus devices built on top of Kali Linux, which includes some special and unique features. Of course, you have all the usual Kali tools in NetHunter as well as the ability to get a full VNC session from your phone to a graphical Kali chroot, however the strength of NetHunter does not end there. We've incorporated some amazing features into the NetHunter OS which are both powerful and unique. From pre-programmed HID Keyboard (Teensy) attacks, to BadUSB Man In The Middle attacks, to one-click MANA Evil Access Point setups, access to the Offensive Security Exploit Database... And yes, NetHunter natively supports wireless 802.11 frame injection with a variety of supported USB NICs. [HIDE][Hidden Content]]
  25. Introduction Pure Blood is a Penetration Testing Framework intended for all hackers, pentesters, bug hunters and those that wants to get involved in pentesting and cybersecurity area. It’s simple tool, created for everyone who need help for daily pentesting tasks, such as information gathering (Whois, DNS Lookup, Reverse DNS Lookup, etc), vulnerability analysis, etc. [HIDE][Hidden Content]] Features Web Pentest/Information Gathering Banner Grab Whois Traceroute DNS Record Reverse DNS Lookup Zone Transfer Lookup Port Scan Admin Panel Scan Subdomain Scan CMS Identify Reverse IP Lookup Subnet Lookup Extract Page Links Directory Fuzz File Fuzz Shodan Search Shodan Host Lookup Web Application Attack: WordPress (WPScan, WPScan Bruteforce, WordPress Plugin Vulnerability Checker) Auto SQL Injection Generator: Deface Page Password Generator Text To Hash