Arecibo

Arecibo – Endpoint for Out-of-Band Exfiltration

In the process of identifying and exploiting vulnerabilities, it is sometimes necessary to resort to Out of Band (OOB) techniques in order to exfiltrate information through DNS resolutions or HTTP...
NanoCore RAT download

Download NanoCore RAT 1.2.2.0 FULL

Features Complete Stealth Remote ControlRecover Passwords from the Victim DeviceManage NetworksManage FilesSurvellancePlugins (To take it to the next level)Many advanced features like SCRIPTING
Legion

Legion – Semi-Automated Network Penetration Testing Framework

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and...
DCOMrade

DCOMrade – Powershell Script for Enumerating Vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work...
trape

trape – Track People on the Web

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching...
Scavenger

Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once credentials are gained,...
king phisher

King Phisher – Phishing Campaign Toolkit

Feature Overview Fully open source means there’s no limits on useRun multiple phishing campaigns simultaneouslyView detailed graphs regarding the campaign resultsSend email with embedded...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including...
Tyton

Tyton – Kernel-Mode Rootkit Hunter

Loadable kernel modules, LKMs for short, are an integral companion to the Linux kernel. Typically, LKMs are used to add support for new hardware (as device drivers) or file systems or add...

cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
211FansLike
0FollowersFollow
2,582FollowersFollow

More Articles