Search the Community

Showing results for tags 'tool'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 319 results

  1. Juumla is a python tool developed to identify the current Joomla version and scan for readable Joomla config files. Features Fast scan Low RAM and CPU usage Identify Joomla version Config files detection Open-Source [hide][Hidden Content]]
  2. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.8.6 Fixed: Any bugs: Thread modification, header parameters, bypass forbidden & any others… Added: google module in requirements/setup Updated: Deleted degoogle modules/script, google dork works now with the “googlesearch” module Updated: A little style modification Updated: Default thread now 30 [hide][Hidden Content]]
  3. It Can Crack Md5 Sha-1 Sha-224 Sha-256 Sha-384 Sha-512 Mysql-4.1+ Salted Md5 Hash mssql2005 nthash [hide][Hidden Content]]
  4. Modified from Apktool Decompiles almost all resource obfuscated apks (like wechat, tiktok) ... Decompiles splitted apks Renames illegal names like @layout/aa -> @layout/layout_0a12 Modified aapt binary tool (for now linux only) to handle illegal character java class names Nicely indented xml [hide][Hidden Content]]
  5. The most complete phishing tool Features : [+] 54 fake screen options! [+] Latest Login Pages ! [+] Mask URL Added ! [+] Easy for Beginners ! [hide][Hidden Content]]
  6. Rafel is Remote Access Tool Used to Control Victims Using WebPanel With More Advance Features. Main Features Admin Permission Add App To White List Looks Like Browser Runs In Background Even App is Closed(May not work on some Devices) Accessibility Feature Support Android v5 - v10 No Port Forwarding Needed [hide][Hidden Content]]
  7. TRY ON VM ONLY. Ryuk .Net Ransomware overwrites all files on the computer (It means nobody can ever return files back) and makes it at least 2 times faster than other ransomwares.It drops read_it.txt for startup folder and all folders which files has been encrypted. This project depends on your donation. Please donete if you want to see next releases in the future This ransomware can change file extension randomized or you can type your own extension. Write your own message and victim will see only that note. readme.txt wil be dropped on every folder which files has been encrypted Encrypted File seems like this [Hidden Content]
  8. About The Project The purpose of the Whoami tool makes you as anonymous as possible on Kali linux. It is an user friendly with its ease of use and simple interface. It follows two different paths to ensure the highest possible level of anonymity. Finally, don't forget that there is never a hundred percent security on the internet! Features Anti mitm Log killer IP changer Dns changer Mac changer Anti cold boot Timezone changer Hostname changer Browser anonymization [hide][Hidden Content]]
  9. Email Verifier Pro is a professional tool which allows you to do verifying bulk list of email addresses and validating them in a background email scanning process and shows scan results with an easy to read report divided into multiple categories like valid, invalid, duplicates, unknown, syntax error addresses. All verified clean email address can be downloaded as CSV or save a clean list in the database for later use from lead management. Which can be used for sending bulk emails to your clients and customers for email marketing purpose. [Hidden Content] [hide][Hidden Content]]
  10. Profil3r is an OSINT tool that allows you to find potential profiles of a person on social networks, as well as their email addresses. This program also alerts you to the presence of a data leak for the found emails. Features Domain TLD (.com, .org, .net, etc…) Emails Data leaks Emails Social Instagram Facebook Twitter Tiktok Linktr.ee MySpace Flickr Programming Github Pastebin LessWrong Forum Hackernews Jeuxvideo.com Web Hosting AboutMe [hide][Hidden Content]]
  11. itsMe

    GitDump - A Pentesting Tool

    GitDump dumps the source code from .git when the directory traversal is disabled Requirements Python3 Tested on Windows Kali Linux What it does Dump source code from website/.git directory when directory traversal is disabled. How it works Fetch all common files (.git/index, .git/HEAD, .git/ORIG_HEAD, etc.). Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, etc. Download idx and pack files. Now you can run git checkout -- . to retrieve source code. [hide][Hidden Content]]
  12. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.8.4 Fixed: Better display of live lines Added: A new file to manage the modules to launches [hide][Hidden Content]]
  13. Windows-Malware-Effects-Remediation-Tool An open-source tool that makes recovering from malware effects - something AVs can't do - MUCH easier. Known Issues Automatic Repair doesn't work. This has been disabled. "Perform repair on separate drive" feature does not work. This has been disabled. Requirements Should work on Windows 7, Windows 8.0, Windows 8.1, Windows 10, Windows 11 .NET Framework 4.5 or later 32-bit or 64-bit OS [hide][Hidden Content]]
  14. Stackposts is a social media marketing tool that allows and helps you to easily auto post, schedule Instagram posts along with Facebook, Twitter and many more!. It also can manage multiple social networks, schedule posts, increase your Traffic and engage your audiences. Just upload the media you want to post, type up your caption, and use the handy calendar to decide when you’d like your post to go out. [Hidden Content] [hide][Hidden Content]]
  15. Email Verifier Pro is a professional tool which allows you to do verifying bulk list of email addresses and validating them in a background email scanning process and shows scan results with an easy to read report divided into multiple categories like valid, invalid, duplicates, unknown, syntax error addresses. All verified clean email address can be downloaded as CSV or save a clean list in the database for later use from lead management. Which can be used for sending bulk emails to your clients and customers for email marketing purpose. [Hidden Content] [hide][Hidden Content]]
  16. RomBuster is a router exploitation tool that allows to disclosure network router admin password. Features Exploits vulnerabilities in most popular routers such as D-Link, Zyxel, TP-Link and Huawei. Optimized to exploit multiple routers at one time from list. Simple CLI and API usage. [hide][Hidden Content]]
  17. [hide][Hidden Content]]
  18. Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.8.3 Fixed: Bug in socketio module Fixed: Add size bytes during th error scan Added: Words in wordlist [hide][Hidden Content]]
  19. Rapid SEO Tool - simple SEO software Improve your position on search engines Rapid SEO Tool is unique search engine optimization and search engine position monitoring software designed to ease the task of improving web page position on search results. It will literally look at your web page code and suggest what can be improved to get better results. You don't even have to be an SEO professional. [Hidden Content] [hide][Hidden Content]]
  20. FuzzingTool FuzzingTool is a web penetration testing tool, that handles with fuzzing. After the test is completed, all possible vulnerable entries (and the response data) are saved on a report file. Changelog v3.11 New features Allow to insert multiple wordlists (globally or per target) Assign a wordlist to each target with numerous -w, or a global wordlist using only one -w; Use multiple wordlists to same target -w 'wordlist1;wordlist2'; Allow to wordlist plugins automatically detects and build their parameters based on target; Now both the exception and the used payload are written in the logfile; Added robots.txt plugin to the wordlists; Updated CLI output options Added an option to disable the terminal colors --no-colors; Added an option to simplify the output mode, removing the time label and reducing the other labels -S, --simple-output; CLI output changes Updated the program’s progress status: the format is more clean and shows the current payload that are being used; Updated the PathScanner status codes coloring; Bugfixes Fixed the proxy setup on Request; Fixed the Logger that wasn’t writting in the logfile; Fixed a bug then more than one method is specified to same target, and the application stops to run; Fixed an exception when the same target is setted more than one time. Now a target can appear more than one time if all of them do the same type of fuzzing, or by selecting a global scanner plugin; Exception handling At now, none of the RequestExceptions will stop the application, instead of it the program will ask for the user if he wants to continue with that target. The objectCreator method from PluginFactory no longer raises a PluginNotFound exception. This exception was transfered to the classCreator in the same factory. Code refatored All the program arguments parsing are now handled by ArgumentParser that extends the argparse.ArgumentParser; Separate the Dictionary class from the wordlists; Removed unused anonimous functions on CliOutput; The blacklist status codes, and actions, was moved to a separated class called BlacklistStatus; Removed the Response class. Now the Request object will return a tuple of items: the raw response from the requests library, and the RTT. The SubdomainRequest appends the target’s ip to this tuple; Moved the FuzzingTool results from the python dictionary to a separated class Result The results are no longer created by the scanners; Changed the getResult method from the scanners to inspectResult; Separated the Matcher from the scanners; Updated base classes to abstract classes; [hide][Hidden Content]]
  21. HatVenom HatSploit native powerful payload generation and shellcode injection tool that provides support for common platforms and architectures. Features Support for most common executable formats like elf, macho, pe. Support for most common architectures like x64, x86, aarch64, armle, mipsle, mipsbe. Ability to modify shellcode by changing pre-defined offsets. Basic functions There are all HatVenom basic functions that can be used to generate a payload, covert data, or inject shellcode. ip_bytes(ip) – Converts IP address to bytes allowed by the shellcode. port_bytes(port) – Converts numeric port to bytes allowed by the shellcode. string_bytes(string) – Converts a string to bytes allowed by the shellcode. generate(file_format, arch, shellcode, offsets={}) – Generates payload for specified target and with specified shellcode. generate_to(file_format, arch, shellcode, offsets={}, filename=’a.out’) – Generates payload for specified target and with specified shellcode and saves it to the specified file. [hide][Hidden Content]]
  22. Black-Dragon An Advanced Automation Tool For Web-Recon Developed For Linux Systems. What Is Black Dragon? It’s A Tool To Automate The Web Reconnaissance Process, Which Make It Easier To Gather Informations About Your Target. This Tool Will Help You In Your Bug Hunting Or Web Penetration Testing Operation Because It Not Only Gather Informations About The Target, But Also It Arranges All This Information In A Structured Way Which Makes You Analyse The Data In A Good Way. This Tool Works In Linux Systems, Specially In Debian & Debian Based Systems Like: Kali Linux Parrot OS Ubuntu Debian Back Box And Other Debian Based Linux Distro’s What Did This Tool Do: Subdomain-Gathering Using: Subfinder Sublist3r Amass Assetfinder Knockpy github-subdomains Getting The Whole Subdomain Gathered Then Filter The Unique Domains And Extract The Only Live Subdomain Using: httprobe Fuzzing The Application Target Based Using: Gobuster Dirsearch Dirb Endpoints Gathering Using: Waybackurls github-endpoints DNS Information Gathering Using: DNSMap DNSEnum MassDNS Gobuster Port Scanning Nmap [hide][Hidden Content]]
  23. GyoiThon is a growing penetration test tool using Machine Learning. It identifies the software installed on the web server (OS, Middleware, Framework, CMS, etc…) based on the learning data. After that, it executes valid exploits for the identified software using Metasploit. Finally, it generates reports of scan results. It executes the above processing automatically. [hide][Hidden Content]]
  24. Tool social engineering [Access Webcam & Microphone & Os Password Grabber & Location Finder] With Ngrok Features: Get Device Information Without Any Permissions Access Location [SMARTPHONES] Os Password Grabber [WIN-10] Access Webcam Access Microphone Operating Systems Tested Kali Linux 2020 [hide][Hidden Content]]