Sign in to follow this
Followers
0

Crack WPA2 PSK Passwords Using Aircrack-Ng Tool
By
itsMe, in Wireless Security
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. WPrecon (WordPress Recon)
Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go.
Features
Detection WAF
Fuzzing Backup Files
Fuzzing Passwords
Random User-Agent
Plugin(s) Enumerator
Theme(s) Enumerator
Scripts
Tor Proxy
User(s) Enumerator
Vulnerability Version Checking (Beta)
Changelog v1.0 alpha
New:
Scripts in LUA 🌑
Vuln Scan (Beta)
Passive Mode User(s) Enumeration
Aggressive Mode User(s) Enumeration
Passive Mode Plugin(s) Enumeration
Aggressive Mode Plugin(s) Enumeration
Passive Mode Theme(s) Enumeration
Aggressive Mode Theme(s) Enumeration
Auto Finding Important File(s)
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. A Cross Platform multifunctional (Windows/Linux/Mac) RAT.
Description
A cross platform RAT written in pure Python. The RAT accept commands alongside arguments to either perform as the server who accepts connections or to perform as the client/target who establish connections to the server. The generate command uses the module pyinstaller to compile the actual payload code. So, in order to generate payload file for your respective platform, you need to be on that platform while generating the file. Moreover, you can directly get the source file as well.
Features
Built-in Shell for command execution
Dumping System Information including drives and rams
Screenshot module. Captures screenshot of client screen.
Connection Loop (Will continue on connecting to server)
Currently, it uses BASE64 encoding.
Pure Python
Cross Platform. (Tested on Linux. Errors are accepted)
Source File included for testing
Python 3
To be expected in future
Stealth Execution
Encryption
Storing Sessions from last attempt
Pushing Notifications when a client connects
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. HawkScan
Security Tool for Reconnaissance and Information Gathering on a website. (python 2.x & 3.x)
This script uses “WafW00f” to detect the WAF in the first step.
This script uses “Sublist3r” to scan subdomains.
This script uses “waybacktool” to check in waybackmachine.
Features
URL fuzzing and dir/file detection
Test backup/old file on all the files found (index.php.bak, index.php~ …)
Check header information
Check DNS information
Check whois information
User-agent random or personal
Extract files
Keep a trace of the scan
Check @mail in the website and check if @mails leaked
CMS detection + version and vulns
Subdomain Checker
Backup system (if the script stopped, it take again in the same place)
WAF detection
Add personal prefix
Auto-update script
Auto or personal output of scan (scan.txt)
Check Github
Recursive dir/file
Scan with an authentication cookie
Option –profil to pass profil page during the scan
HTML report
Work it with py2 and py3
Add option rate-limit if the app is unstable (–timesleep)
Check-in waybackmachine
Response error to WAF
Check if DataBase firebaseio exist and accessible
Automatic threads depending on the response to a website (and reconfig if WAF detected too many times). Max: 30
Search S3 buckets in source code page
Testing bypass of waf if detected
Testing if it’s possible scanning with “localhost” host
Changelog v1.6.7
Add: Option –auth for HTTP authentification. Exemple –auth admin:admin
Fixed: Bugs
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Carnivore – Microsoft External Attack Tool
Overview: Carnivore is an assessment tool for Skype for Business, Exchange, ADFS, and RDWeb servers as well as some O365 functionality. Carnivore includes some new post-authentication Skype for Business functionality.
In general, the tabs will unlock in-line with what functionality you can use. Ie – the post auth options will unlock after you have discovered valid credentials.
Feature
Subdomain Enumeration
Username Enumeration
Smart Enumeration
9 lists of statistically likely usernames
Automatically selects likely format
Legacy vs Modern Format
Password Spraying
Discovered Format
Pre-built lists
Post Compromise
Hidden Content
Give reaction to this post to see the hidden content.
-