There are no reviews yet. Be the first to send feedback to the community and the maintainers!
CTF-Tools
Useful CTF ToolsFTK-imager-OSX
FTK Imager a Forensics Tools For MAC OS Xelpscrk
Elliot Password's CrackerEmail-Bomb
Send Email Bomber Anonymously Using Ur Account Yahoo Or Gmailcrack-cpanel
Crack Contrôl Panelagainst-cracker
against.py is a very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list.AIRBASE-NG-SSLSTRIP-AIRSTRIP-
While documenting some MitM attacks I was looking into setting up a fake AP with BT5 and my good old loved ALFA . There's a whole bunch of scripts out there which do the job nicely, if you are ready to modify them here and there. In order for it to work, you need to run airmon-ng to start the card in monitor mode, run airbase-ng to run it in AP mode, run a DHCP server, set up routing, configure iptables for NAT and set up ip forwarding...that's all ;) Anyway, this works great, ... but great evil minds like to add layers of evilness upon evilness ;) So: why not add sslstrip to the mix and capture all those nice SSL pages which are redirected from normal HTTP? Not that hard: just add an extra iptables line to redirect HTTP traffic to SSLStrip and "Airstrip"is born. Note that this is just something that was cooked up in about an hour, so don't expect any robustness. Also: if it doesn't work out of the box: you are on your own. It works for me, with my particular setup but if you have any experience with BT/Linux, you should be able to make it work for you as well .Air_sslstrip
Capturing Passwords With sslstrip From Network When You Are ConnectedHook-Analyser-V3.4
Hook Analyser is a Freeware Malware Analysis and Cyber Threat Intelligence SoftwareHackloud
Brute Force Access To Apple DeviceStegoMagic
Stegnography tools implement intelligent algorithms to carefully embed the encrypted text messages or data inside other larger files such as an image, audio, video or an executable file.Logcleaner
A Linux logcleaner.bypassing-google-2-factor
bypassing google 2 factor authentification using a simple script javascriptWPA-Crack
Crack Password WPAWriteupsCTF
Writeups For Some CTF ChallengesBluetooth-Tracker
script for tracking link quality and rssi (recieved signal strength) for specified remote bluetooth enabled device.dnsspider
A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation.reversing
Due to the lack of documentation for Immnunity API this is an easy template for function hooking while reversing.yubikill
Shutsdown your computer whenever your yubikey gets disconnected.Bash4Hacking
appdailysales
script Python pour télécharger iTunes Connect rapports de vente quotidiens.airodump
scan Network using monitorWPA-PSK
Cracking Password Type WPA-PSKwp-revslider
WordPress RevSlider File Upload and Execute Vulnerabilityinurlbr-scanner
Advanced search in the search engines, since Enables analysis to exploit GET / POST to capture emails & amp; internal custom validation for each target / url found.Steganography
Python program to steganography files into images using the Least Significant Bit technics.Structured-query-Language-injection
SQL injection Automatic toolsDouble-MITM-Target
MrMugiwara.github.io
Build Your Own Page/Blog/website On Github like mineMetasploit-Encryption
This tool permit to evade any antivirus products. It use a brute force attack on a known plain text to bypass the sandbox.U2F-Key-PIV-TOOLS-MacOSX
YubiKey PIV ManagerPompem-master
extractor-data
This action extracts data from a target URLvps
ripdc-scanner
A lame script which maps domains related to an given ip address or domainname.unzip
Script Unzip avec PHPFind_Malware
find_injected_dllMITM-attack-tool
email-extractor
Extract email address from given domainCapture-Handshake
Script can help you to capture Handshake Of wireless You want AttackedMulti-SQLi
Multi SQL Injectionnull-Byte
filter windows settingHoneypot
A honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information Systems.JPS
joomla python scannerFake-Access-Point
Script can help you to creat a Fake Access Pointsnitch
pentest-mail
ham-sec is simple script which extract email address from given domain for penetration testing process.shellcode-linux
Just because our fuzzer worked or the PoC was fantastic doesn't mean that running calc is gonna put a smile on your face. If you got RCE try our shellcodes to actually do something useful.htaccess-Password-Generator
Limiting web access using passwords. Although you cannot password protect a single document, you can require a userid and password to access a directory. Thus any and all documents stored in that directory cannot be view without entering the proper userid and password. For example, you create a directory called "private" that you want to restrict access so that only a select few friends or customers could see the file(s) in it. This involves the creation of 3 different text files. Below are some examples of what they may look like.scripts-upload
Multiple simple scripts which upload Files from Your Compuer To domain Directory.Love Open Source and this site? Check out how you can help us