Legion

Legion – Semi-Automated Network Penetration Testing Framework

Legion, a fork of SECFORCE’s Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids in discovery, reconnaissance and exploitation of information systems. Legion is developed and...
Arecibo

Arecibo – Endpoint for Out-of-Band Exfiltration

In the process of identifying and exploiting vulnerabilities, it is sometimes necessary to resort to Out of Band (OOB) techniques in order to exfiltrate information through DNS resolutions or HTTP...
DCOMrade

DCOMrade – Powershell Script for Enumerating Vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code execution, data exfiltration, etc. The script is build to work...
Scavenger

Scavenger – A Post-Exploitation Scanning/Mapping Tool

SCAVENGER is a multi-threaded post-exploitation scanning tool for mapping systems and finding “interesting” and most frequently used files, folders and services. Once credentials are gained,...
DFIRTrack

DFIRTrack – The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend. Installation and dependencies
trape

trape – Track People on the Web

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching...
OctoSniff

Download OctoSniff 2.0.3 – PlayStation and XBox IP Sniffer

OctoSniff is a network research tool that allows you to determine information about all the other players you're playing with. It is compatible with PS, XBox 360 and XBox One. It have many other...
OS X login exploit

Com.apple.SystemLoginItems.plist Exploit

History A poorly documented feature of the OS X login process involves the system launching applications listed in the file /Library/Preferences/com.apple.SystemLoginItems.plist with root privileges. At the time of writing,...

cSploit Android Security Toolkit

cSploit - The most complete and advanced IT security professional toolkit on Android. cSploit target My final goal is to write an application that is able to: enumerate local hosts find vulnerabilities find exploits for these...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

The WiFi-Pumpkin is a rogue AP framework to easily create these fake networks, all while forwarding legitimate traffic to and from the unsuspecting target. It comes stuffed with features, including...
209FansLike
0FollowersFollow
2,559FollowersFollow

More Articles