Search the Community

Showing results for tags 'toolkit'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 38 results

  1. httpx httpx is a fast and multi-purpose HTTP toolkit allow to run multiple probers using retryablehttp library, it is designed to maintain the result reliability with increased threads. Features Simple and modular codebase making it easy to contribute. Fast And fully configurable flags to probe multiple elements. Supports vhost, urls, ports, title, content-length, status-code, response-body probbing. Smart auto fallback from https to http as default. Supports hosts, URLs, and CIDR as input. Handles edge cases doing retries, backoffs, etc for handling WAFs. Changelog v0.0.4 2842f9c Added asn2cidr helper script [HIDE][Hidden Content]]
  2. [Hidden Content]
  3. airgeddon This is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods Assisted Handshake file capturing Cleaning and optimizing Handshake captured files Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based) Evil Twin attacks (Rogue AP) Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks WPS features WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.) Compatibility with many Linux distributions (see Requirements section) Easy targeting and selection in every section Drag and drop files on console window for entering file paths Dynamic screen resolution detection and windows auto-sizing for optimal viewing Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired Multilanguage support and autodetect OS language feature (see Supported Languagessection) Help hints in every zone/menu for easy use Auto-update. Script checks for newer version if possible Docker container for easy and quick deployment Http proxy auto detection for updates Changelog v10.21 Improved hostapd-wpe config for some conflicting Linux Dockerfile migrated to Arch (ArchStrike image as base) to avoid Debian based missing packages problem After PMKID capturing, now additionally can transform captured file into .cap aircrack-ng file format [HIDE][Hidden Content]]
  4. Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and executes phishing engagements and security awareness training. The idea behind gophish is simple – make industry-grade phishing training available to everyone. “Available” in this case means two things – Affordable – Gophish is open-source software that is completely free for anyone to use. Accessible – Gophish is written in the Go programming language. This has the benefit that gophish releases are compiled binaries with no dependencies. In a nutshell, this makes installation as simple as “download and run”! Changelog v0.10.1 Gophish Just Got Better. We’re excited to announce v0.10.1. This release significantly improves the performance of sending emails, adds some features and fixes bugs. Here’s just a couple of the exciting changes. [HIDE][Hidden Content]]
  5. [HIDE][Hidden Content]]
  6. The7 — Multi-Purpose Website Building Toolkit for WordPress Compatible with WordPress 5.4 and WooCommerce 4.1. GDPR ready. Full WordPress 5 compatibility. Full Elementor compatibility. Full WooCommerce compatibility. Full Gutenberg compatibility. [Hidden Content] [HIDE][Hidden Content]]
  7. Modern Denial-of-service ToolKit [HIDE][Hidden Content]]
  8. Introduction Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioural analysis Built-in aliases of often used shell commands Extends system shell with post-exploitation oriented functionalities Stealthy, with custom cleanup routine activated on exit Easily extensible (add new commands by creating Bash functions) Full tab completion [HIDE][Hidden Content]]
  9. airgeddon This is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods Assisted Handshake file capturing Cleaning and optimizing Handshake captured files Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based) Evil Twin attacks (Rogue AP) Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks WPS features WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.) Compatibility with many Linux distributions (see Requirements section) Easy targeting and selection in every section Drag and drop files on console window for entering file paths Dynamic screen resolution detection and windows auto-sizing for optimal viewing Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired Multilanguage support and autodetect OS language feature (see Supported Languagessection) Help hints in every zone/menu for easy use Auto-update. Script checks for newer version if possible Docker container for easy and quick deployment Http proxy auto detection for updates Changelog v10.11 Fixed error on PMKID capturing due hcxdumptool different params for different versions Added feature to detect captured PMKID while capturing Handshake Integration of PMKID on Evil Twin Captive Portal [HIDE][Hidden Content]]
  10. Paradoxia Console Features Multithreaded, You can get multiple sessions. Configuration file BOT information database. Root Shell. Easy to use. Interact with online BOTs in a session. Kill a BOT. Blacklist BOT IP Adresses from connecting. Scan Connected IP if you do not get a session seconds after it connected. Get Desktop Notification if a new BOT connects. Build BOT with Host and Port easily. Enable/Disable and change settings in paradoxia.ini ( verbose, Auto print bot information on connect, BOT password, etc) Paradoxia Windows Bot Features NOTE : Do not upload the BOT to online scanners! Fully Undetectable. View System Information. Persistence. Stealth. Usb Infection. File System Browsing. File Upload. File Download. Command Executing. Powershell Executing. Get PID of Process. Kill a Process. Screenshot. Mic Recording. Paradoxia IRIS Features Mass Emailing with either legitimate or malacious Attachment. Mass Emailing with or without an Email List. Random Brute Force Discovery : Discover Instagram Usernames. Random Brute Force Discovery : Discover Instagram Usernames and do a quick Brute Force on them with weak Passwords to possibly discover the Password. Instagram Brute Force over Tor. Paradoxia LoginDataText Features Get information from ANY 'Login Data' File from Google Chrome. Information such as URLS and Emails. Paradoxia Thawne Features Undetectable. Persistent. Runs in background. A type of Logic Bomb with no harmful effects. Run your file if it's not running on the System. Download your file if it's deleted or not running. Uses Powershell to Download file. [HIDE][Hidden Content]]
  11. Methods: Method Target Description SMS +PHONE SMS & CALL FLOOD NTP IP:PORT NTP amplification is a type of Distributed Denial of Service (DDoS) attack in which the attacker exploits publically-accessible Network Time Protocol (NTP) servers to overwhelm the targeted with User Datagram Protocol (UDP) traffic. SYN IP:PORT A SYN flood (half-open attack) is a type of denial-of-service (DDoS) attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources. TCP IP:PORT What is a SYN flood attack. TCP SYN flood (a.k.a. SYN flood) is a type of Distributed Denial of Service (DDoS) attack that exploits part of the normal TCP three-way handshake to consume resources on the targeted server and render it unresponsive. UDP IP:PORT A UDP flood is a type of denial-of-service attack in which a large number of User Datagram Protocol (UDP) packets are sent to a targeted server with the aim of overwhelming that device’s ability to process and respond. The firewall protecting the targeted server can also become exhausted as a result of UDP flooding, resulting in a denial-of-service to legitimate traffic. POD (Ping of Death) IP Ping of Death (a.k.a. PoD) is a type of Denial of Service (DoS) attack in which an attacker attempts to crash, destabilize, or freeze the targeted computer or service by sending malformed or oversized packets using a simple ping command. HTTP URL HTTP Flood is a type of Distributed Denial of Service (DDoS) attack in which the attacker manipulates HTTP and POST unwanted requests in order to attack a web server or application. These attacks often use interconnected computers that have been taken over with the aid of malware such as Trojan Horses. Slowloris IP:PORT Slowloris is a denial-of-service attack program which allows an attacker to overwhelm a targeted server by opening and maintaining many simultaneous HTTP connections between the attacker and the target. Memcached IP:PORT A memcached distributed denial-of-service (DDoS) attack is a type of cyber attack in which an attacker attempts to overload a targeted victim with internet traffic. The attacker spoofs requests to a vulnerable UDP memcached* server, which then floods a targeted victim with internet traffic, potentially overwhelming the victim’s resources. While the target’s internet infrastructure is overloaded, new requests cannot be processed and regular traffic is unable to access the internet resource, resulting in denial-of-service. [HIDE][Hidden Content]]
  12. Gophish: Open-Source Phishing Toolkit Gophish is an open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training. [HIDE][Hidden Content]]
  13. airgeddon This is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods Assisted Handshake file capturing Cleaning and optimizing Handshake captured files Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based) Evil Twin attacks (Rogue AP) Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks WPS features WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.) Compatibility with many Linux distributions (see Requirements section) Easy targeting and selection in every section Drag and drop files on console window for entering file paths Dynamic screen resolution detection and windows auto-sizing for optimal viewing Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired Multilanguage support and autodetect OS language feature (see Supported Languagessection) Help hints in every zone/menu for easy use Auto-update. Script checks for newer version if possible Docker container for easy and quick deployment Http proxy auto detection for updates Changelog v10.01 Removed deprecated ifconfig and iwconfig commands and dependencies Fixed error on enterprise certificates validation Added autoselection for secondary interface if only one existing Airmon compatibility check system refactored Fixed error in default paths trophy files for ettercap/bettercap [HIDE][Hidden Content]]
  14. CQTOOLS The New Ultimate Hacking Toolkit Black Hat Asia 2019 CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature. CQURE_BHAsia19_Paula_Januszkiewicz_slides from ZuzannaKornecka Download: [Hidden Content]
  15. Pown Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploits, Pown.js considers frameworks to be an anti-pattern. Therefore, each module in Pown is in fact a standalone NPM module allowing greater degree of reuse and flexibility. Creating new modules is a matter of publishing to NPM and tagging it with the correct tags. The rest is handled automatically. [HIDE][Hidden Content]]
  16. Includes Phishing, Accounts Checking, Spamming, Email Clone, GPS attack, Cookie Hijacking etc. pp Check Account Checker YouTube Tutorial [Hidden Content] Download: [HIDE][Hidden Content]]
  17. AntiSpy A powerful anti rootkit toolkit AntiSpy is a free but powerful anti virus and rootkits toolkit. It offers you the ability with the highest privileges that can detect,analyze and restore various kernel modifications and hooks. With its assistance,you can easily spot and neutralize malwares hidden from normal detectors. Development IDE: Visual Studio 2008 Userspace: MFC WDK: WDK7600 Third-party Library: Codejock toolkit pro Code Structure AntiSpy_Root_Dir ├── LICENSE ├── README.md ├── doc (AntiSpy introduction files) │ ├── Readme.txt │ └── 说明.txt ├── icon │ └── icon.ico ├── src │ ├── Antispy (AntiSpy main project) │ │ ├── Common (The common structs&defines,used by userspace&kernel) │ │ ├── SpyHunter (Userspace project,written in MFC) │ │ ├── SpyHunter.sln (VS2008 solution file) │ │ └── SpyHunterDrv (Kernel project) │ └── ResourceEncrypt (Encryption tool project) │ ├── ResourceEncrypt (Encrypt driver and other resources) │ ├── ResourceEncrypt.sln (VS2008 solution file) │ └── clear.bat └── tools ├── ResourceEncrypt.exe └── TestTools.exe (Used to test the functionality of Antispy) Features Currently,the following features are available(including but not limited to): Process Manager Display system process and thread basic informations. Detect hidden processes,threads,process modules. Terminate, suspend and resume processes and threads. View and manipulate process handles,windows and memory regions. View and manipulate process hotkeys,privileges,and timers. Detect and restore process hooks incluing inline hooks,patches,iat and eat hooks. Inject dll,dump process memory. Create debug dump,include mini dump and full dump. Kernel Module Viewer Display kernel module basic information,include image base,size,driver object,and so on. Detect hidden kernel modules. Unload kernel modules. Dump kernel image memory. Display and delete system driver service informations. Hook Detector Detect and restore SSDT,Shadow SSDT,sysenter and int2e hooks. Detect and restore FSD and keyboard disptach hooks. Detect and restore kernel code hooks including kernel inline hooks,patches,iat and eat hooks. Detect and restore message hooks,both global and local. Detect and restore kernel ObjectType hooks. Display Interrupt Descriptor Table(IDT). Other Kernel Information Viewer View and remove kernel notifications. View filters for common devices include disk,volume,keyboard and network devices. View IO timers,DPC timers,system threads,and so on. Registry Manager View and edit system registry. Detect hidden registry entries using live registry hive analysis. File Manager Display file basic information,include file name,size,attributes,and so on. Detect hidden files. View and delete locked files and folders. Service Manager Display system services basic informations. Control services status. Modify services startup type. Autorun Manager Display almost all kinds of system autorun types. Enable,disable or permanently delete autoruns. Network Viewer Display current network connections,include TCP and UDP informations. View and delete IE plugins and context menu. Display winsock providers(LSP). View and edit hosts file. Other Tools Hex Editor - View and edit memory,include ring3 process memory and ring0 system memory. Disassembler - Like OllyDBG,support ring3 process memory and ring0 system memory. Settings Custom color settings. User Interfaces Process Tree Process Menu Network File Manager AutoRun Manager Download: [HIDE][Hidden Content]]
  18. itsMe

    Proxy ToolKit v1.3

    Proxy Scanner and Scraper A program that: Scans proxies determining their performance (latency), type (HTTP or SOCKS), anonymity level (L1-L3) Scrapes proxies off a given URL list Harvests URLs using the BING search engine based on date (optional) for the most recent proxies [HIDE][Hidden Content]]
  19. airgeddon This is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods Assisted Handshake file capturing Cleaning and optimizing Handshake captured files Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based) Evil Twin attacks (Rogue AP) Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks WPS features WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.) Compatibility with many Linux distributions (see Requirements section) Easy targeting and selection in every section Drag and drop files on console window for entering file paths Dynamic screen resolution detection and windows auto-sizing for optimal viewing Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired Multilanguage support and autodetect OS language feature (see Supported Languagessection) Help hints in every zone/menu for easy use Auto-update. Script checks for newer version if possible Docker container for easy and quick deployment Http proxy auto detection for updates Changelog v10 Added plugins system Added example plugin: Missing dependencies auto-installation for some distros (Kali, Parrot, BlackArch) Improvements for Evil Twin on captive portal detection for newer devices Missing 5GHz channels added Github pull request template added and issue templates updated Fixed error on hex2ascii conversion for some WEP passwords [HIDE][Hidden Content]]
  20. Trend Micro Anti-Threat Toolkit (ATTK) versions 1.62.0.1218 and below suffer from a remote code execution vulnerability. View the full article
  21. Introduction: UFONet - is a toolkit designed to launch DDoS and DoS attacks. + See these links for more info: - CWE-601:Open Redirect - OWASP:URL Redirector Abuse UFONet abuses OSI Layer 7-HTTP to create/manage 'zombies' and to conduct different attacks using; GET/POST, multithreading, proxies, origin spoofing methods, cache evasion techniques, etc. + [01/2018] - UFONet (v1.2 "HackRon") slides: (.pdf) + [12/2016] - UFONet (v0.8 "Ninja DDoS Nation") slides: (.pdf) [HIDE][Hidden Content]]
  22. itsMe

    WebApp Pentest toolkit

    Tools Listeners HTTP Server DNS Server TCP Server POSTMessage Hooker Websocket Hooker Analysis HTTP/JS-Files/Binary Analyze Analyze Files (Binary, Metadata, Text files, Js sinks) Net Tools Get DNS Records Resolve Hosts Reverse IPs Passive DNS DNS History Text Tools Text Processing Block construct Format generator pattern creation Encrypt/Decrypt data Hash Identification Crackers Payload Generators Encoders/Decoders Poc Generators (Python, Bash, HTML) Recon Get Websites ScreenShots GET Subdomains (Scrabbing, Minning, DNS-brute-force, Http-brute-force) Site categorizer s3/GC bucket enumeration Github Lister Ip History Scanners Detect Misconfiguration Port/vulnerability/ssl scanner Vulnerability Exploiters Waf Detection Scrabbers Download Android apps (APK) Travis-CI logs fetching if the app is not working properly, Download this archive dlls.zip and extract the dll files, put them in the application folder, beside the executable file Some notes: This tool is meant primarily for bug hunters (especially beginners). This tool is not backdoored with any malicious software/tracking. This tool contains bugs more than features so use it carefully. Connections are issued using the .Net (SystemDotWeb) which is slow and limited by design, consider using many threads, this will be replaced with another solution. Memory is not carefully managed so be careful, do not use all the tools at the same time. Do not use it illegally Tools starting with _ are not built yet, I added buttons to remember writing them so I could build them in future, hence no need to reverse engineer the tool in order to enable them, if you have time feel free to do it no problem. Many third-parties are used without permission no APIS used. The source code is not published because the tool is a beta and the code is ugly and worse than my handwriting. The project is planned to be open-source with the first release. Suggestions are deeply welcome. Credits are reserved for all authors and third-parties. [HIDE][Hidden Content]]
  23. Features: Retrieve your lost or deleted files including contacts, text messages, contacts, call history and documents from Android devices or SD card. Restore deleted or lost photos, music, videos and WhatsApp file and get them back from your Android with this android data recovery tool. Backup and manage your Android data (including lost or deleted files) on your Windows computer or Mac easily with the USB cable. Recover deleted files on Android from many situations including files deleting, system crashing, forgotten password, rooting error, etc. OS: Windows 10, Windows 8.1, Windows 8, Windows 7, Windows Vista, Windows XP CPU: 1GHz Intel/AMD CPU or above RAM: 1GB RAM or more Hard Disk Space: 200 MB and above free space [Hidden Content] [Hidden Content]
  24. dEEpEst

    HackerTarget ToolKit

    HackerTarget ToolKit Use open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an organizations vulnerabilities is an impossible task without tactical intelligence on the network footprint. By combining open source intelligence with the worlds best open source security scanning tools, we enable your attack surface discovery. With the ability for Internet assets to be deployed in seconds, the attack surface is more dynamic and ever growing. This very fact makes mapping your external network footprint a hard problem. We aim to provide solutions to solve this problem. Start with our tools for domain and IP address data, then pivot to mapping the exposure with hosted open source scanners. We have developed a linux terminal tool using python programming language through an api which we received from ! [Hidden Content]
  25. airgeddon This is a multi-use bash script for Linux systems to audit wireless networks. Features Interface mode switcher (Monitor-Managed) keeping selection even on interface name changing DoS over wireless networks using different methods Assisted Handshake file capturing Cleaning and optimizing Handshake captured files Offline password decrypting on WPA/WPA2 captured files (dictionary, bruteforce and rule-based) Evil Twin attacks (Rogue AP) Only Rogue/Fake AP version to sniff using external sniffer (Hostapd + DHCP + DoS) Simple integrated sniffing (Hostapd + DHCP + DoS + Ettercap) Integrated sniffing, sslstrip (Hostapd + DHCP + DoS + Ettercap + Sslstrip) Integrated sniffing, sslstrip2 and BeEF browser exploitation framework (Hostapd + DHCP + DoS + Bettercap + BeEF) Captive portal with “DNS blackhole” to capture wifi passwords (Hostapd + DHCP + DoS + Dnsspoff + Lighttpd) Optional MAC spoofing for all Evil Twin attacks WPS features WPS scanning (wash). Self-parameterization to avoid “bad FCS” problem Custom PIN association (bully and reaver) Pixie Dust attacks (bully and reaver) Bruteforce PIN attacks (bully and reaver) Parameterizable timeouts Known WPS PINs attack (bully and reaver), based on online PIN database with auto-update Integration of the most common PIN generation algorithms WEP All-in-One attack (combining different techniques: Chop-Chop, Caffe Latte, ARP Replay, Hirte, Fragmentation, Fake association, etc.) Compatibility with many Linux distributions (see Requirements section) Easy targeting and selection in every section Drag and drop files on console window for entering file paths Dynamic screen resolution detection and windows auto-sizing for optimal viewing Controlled Exit. Cleaning tasks and temp files. Option to keep monitor mode if desired Multilanguage support and autodetect OS language feature (see Supported Languagessection) Help hints in every zone/menu for easy use Auto-update. Script checks for newer version if possible Docker container for easy and quick deployment Http proxy auto detection for updates Changelog 9.21 Fixed non-closing windows on some DoS pursuit mode attacks Added retrocompatibility for mdk3, added option in .airgeddonrc file to handle it Fixed bug on WEP all-in-one attack (Fake Auth) for SSIDs containing spaces Fixed repeated enterprise plain passwords captured on trophy files Added custom certificates creation for enterprise attacks Fixed error on BeEF attack using tmux [HIDE][Hidden Content]]