Search the Community

Showing results for tags 'tool'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Staff
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Pentesting Premium
  • Modders Section
  • PRIV8-Section
  • Pentesting Zone PRIV8
  • Carding Zone PRIV8
  • Recycle Bin
  • Null3D's Nulled Group

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 344 results

  1. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.9.5 Fixed: A pass on the source code, more speedy [hide][Hidden Content]]
  2. A tool for generating fake code signing certificates or signing real ones. A tool which creates a spoof code signing certificates and sign binaries and DLL files to help evade EDR products and avoid MSS and sock scruitney. LimeLighter can also use valid code signing certificates to sign files. Limelighter can use a fully qualified domain name such as acme.com. [hide][Hidden Content]]
  3. How to use: (below is the .gif of 2.39mb which will take time to load depending on your Internet speed, so bear with me ) Detail: This tool can bypass and repair file verification checks of all the versions of ZProtect HWID protected executables. It was originally posted in 52pojie forum in Chinese lang, also it didn't work on Windows 10. But I unpacked it (vmprotect), fixed the issue (WIN10) and translated it into English. All credit goes to Kido (developer of this tool) [hide][Hidden Content]]
  4. Disclaimer Any actions and or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question. The contributors will not be held responsible in the event any criminal charges be brought against any individuals misusing this toolkit to break the law. This toolkit contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way. This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here! It only demonstrates "how phishing works". You shall not misuse the information to gain unauthorized access to someones social media. However you may try out this at your own risk. Features Latest and updated login pages. Mask URL support Beginners friendly Docker support (checkout docker-legacy branch) Multiple tunneling options Localhost Ngrok (With or without hotspot) Cloudflared (Alternative of Ngrok) [Hidden Content]
  5. EXOCET – AV-evading, undetectable, payload delivery tool EXOCET is superior to Metasploit’s “Evasive Payloads” modules as EXOCET uses AES-256 in GCM Mode (Galois/Counter Mode). Metasploit’s Evasion Payloads uses an easy to detect RC4 encryption. While RC4 can decrypt faster, AES-256 is much more difficult to ascertain the intent of the malware. [hide][Hidden Content]]
  6. Viper is a graphical intranet penetration tool, which modularizes and weaponizes the tactics and technologies commonly used in the process of Intranet penetration Viper integrates basic functions such as bypass anti-virus software, intranet tunnel, file management, command line and so on Viper has integrated 80+ modules, covering Resource Development / Initial Access / Execution / Persistence / Privilege Escalation / Defense Evasion / Credential Access / Discovery / Lateral Movement / Collection and other categories Viper's goal is to help red team engineers improve attack efficiency, simplify operation and reduce technical threshold Viper supports running native msfconsole in browser and multi - person collaboration v1.5.2 20211007 Optimization Login page multilingual support Merged metasploit-framework 6.1.9 [hide][Hidden Content]]
  7. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exists and is accessible Automatic threads depending on the response to a website (and reconfig if WAF is detected too many times). Max: 30 Search S3 buckets in the source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.9.3 beta Updated: New banner Fixed: Multiple websites with a file which contains url [hide][Hidden Content]]
  8. CHAOS is a free and open-source Remote Administration Tool that allow generate binaries to control remote operating systems. Features Feature Reverse Shell X X Download File X X Upload File X X Screenshot X X File Explorer X X Get OS Info X X Run Hidden X Restart X X Shutdown X X Disclaimer THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM. [hide][Hidden Content]]
  9. Terra: Recon tool on Social Media Networks. Twitter Recon Commands: ls: Display all Terra Commands help: For Help quit: For quiting the program clear: For cleaning your terminal screen exit: For exiting from Terra reset target : Reset new target in command line tweets : Get latest tweets tweeted by Target favtweets : Get latest tweets which favorited by Target followers : Get target’s followers list following : Get target’s following list info: Get overview and infomation about target profile pic: Download Target’s Profile Picture banner: Download Target’s Profile banner htags : Get hashtags used by Target Instgram Recon Commands: ls : Display Terra Commands, help : for Help, clear: for clearning your Screen, quit: for quiting, exit: For Exiting from Terra, locations : For getting Pinned location of target, captions : For gathering target’s captions, reset target: For resetting target in Terra, comments : For all comments of target, followers : For getting follower’s list of target, followings: For getting following list of target followers emails : For target’s followers emails, following emails : For target’s following emails, followers phone : For target followers phone numbers, followings phone : For target followings phone numbers, tags : For getting hashtags used by target , timeline : For overview of target’s account , likes: Get total_likes of target, ‘ mediatype : For information of photos and video of target, photodes : For gathering target photos description, ‘ photos : For Downloading target’s photos, profile pic : For downloading target’s profile picture, stories : For downloading target’s stories , tagged’: For listing user who tagged by target, commenter’: For getting all user who commented on target’s posts ttag : For listing user tagged target in their posts [hide][Hidden Content]]
  10. james bond

    tool remote

    Hello , I'm looking for a software to retrieve or extract the openbullet configs on a remote Thank you ;)
  11. This tool allows to statically analysis windows, Linux, osx, executables, and also APK files. You can get: What DLL files are used. Functions and API. Sections and segments. URLs, IP addresses, and emails. Android permissions. File extensions and their names. And so on… [hide][Hidden Content]]
  12. Hyara is IDA Plugin that provides convenience when writing yard rules. You can designate the start and end addresses to automatically create rules. It was created based on GUI, and adding features and improvements are currently underway. Features Hyara start screen and 2 options When you run Hyara, it aligns to the right like the below picture and the output window is aligned to the left. Select/Exit button uses IDAViewWrapper api to get the clicked address in IDA View. After done, you have to press it again to finish. After specifying the address, press the “Make” button to show the specified hexadecimal or strings as a result. When you click “Save”, those results will be saved in the table below. Press “Export Yara Rule” to finally create the yararule using variables stored in the previous step. The comment option on the upper right side annotates the assemblies nicely. The wildcard option works but further development are still ongoing. [hide][Hidden Content]]
  13. Go365 Go365 is a tool designed to perform user enumeration* and password guessing attacks on organizations that use Office365 (now/soon Microsoft365). Go365 uses a unique SOAP API endpoint on login.microsoftonline.com that most other tools do not use. When queried with an email address and password, the endpoint responds with an Azure AD Authentication and Authorization code. This code is then processed by Go365 and the result is printed to a screen or an output file. * User enumeration is performed in conjunction with a password guess attempt. Thus, there is no specific flag or functionality to perform only user enumeration. Instead, conduct your first password guessing attack, then parse the results for valid users. Read these three bullets! This tool might not work on all domains that utilize o365. Tests show that it works with most federated domains. Some domains will only report valid users even if a valid password is also provided. Your results may vary! The domains this tool was tested on showed that it did not actually lock out accounts after multiple password failures. Your results may vary! This tool is intended to be used by security professionals that are authorized to “attack” the target organization’s o365 instance. Changelog v1.4 Updated Go365 to include the MS “graph” api through the URL login.microsoft.com/common/oauth2/token. Specify -endpoint graph to use this new endpoint. [hide][Hidden Content]]
  14. What is Peirates? Peirates, a Kubernetes penetration tool, enables an attacker to escalate privilege and pivot through a Kubernetes cluster. It automates known techniques to steal and collect service accounts, obtain further code execution, and gain control of the cluster. v1.0.35 - Updated GCP metadata API token parsing for Google's change Updated GCP metadata API token parsing for Google's change [hide][Hidden Content]]
  15. Features -> Multiple dorks for Wordpress -> Check most commons CVE -> WPSCAN (wpscan.com) -> TOR support -> Save passwords to db [hide][Hidden Content]]
  16. Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of them. Written in python 3 Provides a modelisation of "pentest objects" : Scope, Hosts, Ports, Commands, Tools etc. Tools/scripts are separated into 4 categories : wave, Network/domain, IP, Port Objects are stored in a NoSQL DB (Mongo) Keep links between them to allow queries Objects can be created through parsers / manual input Business logic can be implemented (auto vuln referencing, item triggers, etc.) Many tools/scripts launch conditions are availiable to avoid overloading the target or the scanner. A GUI based on tcl/tk Features Register your own tools Add command line options in your database. Create your own light plugin to parse your tool output. Use the objects Models to add, update or delete objects to the pentest inside plugins. Limit the number of parallel execution of noisy/heavy tools Define a recon/fingerprinting procedure with custom tools Choose a period to start and stop the tools Define your scope with domains and network IP ranges. Custom settings to include new hosts in the scope Keep results of all files generated through tools executions Start the given docker to implement numerous tools for LAN and Web pentest Collaborative pentests Split the work between your machines by starting one worker by computer you want to use. Tags ip or tools to show your team mates that you powned it. Take notes on every object to keep trace of your discoveries Follow tools status live Search in all your objects properties with the fitler bar. have a quick summary of all hosts and their open ports and check if some are powned. Reporting Create security defects on IPs and ports Make your plugins create defects directly so you don't have to Generate a Word report of security defects found. You can use your own template with extra work. Generate a Powerpoint report of security defects found. You can use your own template with extra work. Currently integrated tools IP / port recon : Nmap (Quick nmaps followed by thorough scan) Domain enumeration : Knockpy, Sublist3r, dig reverse, crtsh Web : WhatWeb, Nikto, http methods, Dirsearch LAN : Crackmapexec, eternalblue and bluekeep scan, smbmap, anonymous ftp, enum4linux Unknown ports : amap, nmap scripts Misc : ikescan, ssh_scan, openrelay Roadmap Change the architecture to an API based one Get rid of Celery Add flexibity for commands Improve UX Add more plugin and improve existing ones Add real support for users / authenticated commands [hide][Hidden Content]]
  17. itsMe

    ESP32 Wi-Fi Penetration Tool

    ESP32 Wi-Fi Penetration Tool This project introduces an universal tool for the ESP32 platform for implementing various Wi-Fi attacks. It provides some common functionality that is commonly used in Wi-Fi attacks and makes implementing new attacks a bit simpler. It also includes Wi-Fi attacks itself like capturing PMKIDs from handshakes, or handshakes themselves by different methods like starting rogue duplicated AP or sending deauthentication frames directly, etc… Obviously cracking is not part of this project, as ESP32 is not sufficient to crack hashes in an effective way. The rest can be done on this small, cheap, low-power SoC. Features PMKID capture WPA/WPA2 handshake capture and parsing Deauthentication attacks using various methods Denial of Service attacks Formatting captured traffic into PCAP format Parsing captured handshakes into HCCAPX file ready to be cracked by Hashcat Passive handshake sniffing Easily extensible framework for new attacks implementations Management AP for easy configuration on the go using a smartphone for example And more… [hide][Hidden Content]]
  18. A Post exploitation tool written in C# uses either CIM or WMI to query remote systems. Introduction SharpStrike is a C# rewrite and expansion on @Matt_Grandy_'s CIMplant and @christruncer's WMImplant. SharpStrike allows you to gather data about a remote system, execute commands, exfil data, and more. The tool allows connections using Windows Management Instrumentation, WMI, or Common Interface Model, CIM ; well more accurately Windows Management Infrastructure, MI. CIMplant requires local administrator permissions on the target system. [hide][Hidden Content]]
  19. SharpSpray SharpSpray is a Windows domain password spraying tool written in .NET C#. SharpSpray is a C# port of DomainPasswordSpray with enhanced and extra capabilities. This tool uses LDAP Protocol to communicate with the Domain active directory services. Features Can operate from inside and outside a domain context. Exclude domain disabled accounts from the spraying. Auto gathers domain users from the Active directory. Avoid potential lockouts by excluding accounts within one attempt of locking out. Avoid potential lockouts by auto-gathering domain lockout observation window settings. Compatible with Domain Fine-Grained Password policies. Custom LDAP filter for users, e.g. (description=admin) Delay in seconds between each authentication attempt. Jitter between each authentication attempt. Support a single password or a list of passwords. Single file Console Application. [hide][Hidden Content]]
  20. itsMe

    Nemesis - A .NET file Dump tool

    A .NET file Dump tool based on KsDumper. The way it works is similar to KsDumper. This tool works well for those who don't know how to use KsDumper / can't run KsDumper on their computer. Talking about smooth operation? Of course, it's very good. Much better than KsDumper. [hide][Hidden Content]]
  21. Tachyon is a Fast Multi-Threaded Web Discovery Tool. The main goal of it is to help webadmins find leftover files in their site installation, permission problems and web server configuration errors. It is not a vulnerability scanner or a web crawler. Features It provides: Plugin support SSL support Robots.txt support Common directory lookup Fast Multi-Threaded execution Automatic variable rate limiter Recursive scanning Changelog v3.4.1 Merge pull request #58 from alacasse/limit-fp-for-c99shell limit-fp-for-c99shell: add match_string [hide][Hidden Content]]
  22. Erebus is used to test every parameter across targets based on Yaml templates leading to zero false positives and providing fast scanning on a large number of hosts. Erebus offers many useful features including an intercepting proxy which allows researchers to browse the web, click on links and Erebus will test every parameter that passes through the proxy. [hide][Hidden Content]]
  23. HawkScan Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x) This script uses “WafW00f” to detect the WAF in the first step. This script uses “Sublist3r” to scan subdomains. This script uses “waybacktool” to check in the waybackmachine. Features URL fuzzing and dir/file detection Test backup/old file on all the files found (index.php.bak, index.php~ …) Check header information Check DNS information Check whois information User-agent random or personal Extract files Keep a trace of the scan Check @mail in the website and check if @mails leaked CMS detection + version and vulns Subdomain Checker Backup system (if the script stopped, it take again in the same place) WAF detection Add personal prefix Auto-update script Auto or personal output of scan (scan.txt) Check Github Recursive dir/file Scan with an authentication cookie Option –profil to pass profil page during the scan HTML report Work it with py2 and py3 Add option rate-limit if the app is unstable (–timesleep) Check-in waybackmachine Response error to WAF Check if DataBase firebaseio exist and accessible Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30 Search S3 buckets in source code page Testing bypass of waf if detected Testing if it’s possible scanning with “localhost” host Changelog v1.9 Fixed: Fixed percentage & line count bug during scan Added: Display errors number in live during scan [hide][Hidden Content]]
  24. Features userrecon - username reconnaissance facedumper - dump facebook information mailfinder - find email with specific name godorker - dorking with google search phoneinfo - phone number information dnslookup - domain name system lookup whoislookup - identify who is on domain sublookup - sub networking lookup hostfinder - find host domain dnsfinder - find host domain name system riplookup - reverse ip lookup iplocation - ip to location tracker [hide][Hidden Content]]
  25. A Subdomain Enumeration and Validation tool for Bug Bounty and Pentesters. Key Features OSINT + Subdomain Bruteforcing Capable of handling outputs from multiple tools Handling False Positives and Filters subdomains with same resolutions. Checking for Server Banners and Ports Incredibly Fast Handling domains with larger scopes Port Scanning [hide][Hidden Content]]