PRINT
PRINT
SEND MAIL
SEND MAIL

Month: June 2020

NEW TOOLSCryptographyDecodingEncodingBase16Base32Base58BASE64BasecrackCryptography ProjectCryptography ToolsDecode Strings

Basecrack – Best Decoder Tool For Base Encoding Schemes

BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from argument, multi-encoded bases and decode them incredibly fast.Decode Base16, Base32, Base36, Base58, Base62, Base64, Base64Url, Base85, Base91, Base92 and more with the best base encoding scheme decoding tool in town. It's useful for CTFs, Bug Bounty Hunting, and Cryptography.What's new in v1.1: I heard your feature requests, now you can generate a wordlist/output with the…

NEW TOOLSMetasploit FrameworkWrapperPayload GeneratorPayload GenerationCross PlatformMsfvenom PayloadMsfvenom Payload Creator Windows

MSFPC – MSFvenom Payload Creator

A quick way to generate various "basic" Meterpreter payloads via msfvenom (part of the Metasploit framework).AboutMSFvenom Payload Creator (MSFPC) is a wrapper to generate multiple types of payloads, based on users choice. The idea is to be as simple as possible (only requiring one input) to produce their payload.Fully automating msfvenom & Metasploit is the end goal (well as to be be able to automate MSFPC itself). The rest is to make the user's life as easy as possible (e.g. IP selection menu, msfconsole…

NEW TOOLSCIS BenchmarkCIS Kubernetes BenchmarkCIS SecurityKube BenchKubernetes SecurityOpenshift

Kube-Bench – Checks Whether Kubernetes Is Deployed According To Security Best Practices As Defined In The CIS Kubernetes Benchmark

kube-bench is a Go application that checks whether Kubernetes is deployed securely by running the checks documented in the CIS Kubernetes Benchmark.Tests are configured with YAML files, making this tool easy to update as test specifications evolve.Please Note kube-bench implements the CIS Kubernetes Benchmark as closely as possible. Please raise issues here if kube-bench is not correctly implementing the test as described in the Benchmark. To report issues in the Benchmark itself (for example, tests that you believe are inappropriate), please join the CIS…

NEW TOOLSMacWifiARPEvilNet

EvilNet – Network Attack Wifi Attack Vlan Attack Arp Attack Mac Attack Attack Revealed Etc…

Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../install :sudo pip3 install -r requirements.txtEvilNet Attack NetworkScan NetworkWifi AttackARP AttackBrute Force Attack protocolVlan Hopping AttackMac Flooding AttackTwitter: EvilNet

NEW TOOLSPython3FUDAntivirus EvasionBypass AntivirusBackdoor FUDUndetectableUndetectable RATXeexe

Xeexe – Undetectable And XOR Encrypting With Custom KEY (FUD Metasploit RAT)

Undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,...(PYTHON 3)Undetectable Reverse shell (Metasploit Rat)Xeexe is an FUD exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Windows Xeexe Provides An Easy way to create Backdoors and Payload which can bypass TOP antivirus.Features !python3 and Ngrok support.Automatically Xor encrypting with custum KEY that you can use for increasing bypass Av.Automatically Add Icon to executable.Automatically Add Manifest to executable.Bypass anti-virus…

NEW TOOLSReportingCrawlingSimulationTakedownBSF

BSF – Botnet Simulation Framework

BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings and allow defenders to evaluate monitoring and countermeasures.SynopsisIn the arms race between botmasters and defenders, the botmasters have the upper hand, as defenders have to react to actions and novel threats introduced by botmasters. The Botnet Simulation Framework (BSF) addresses this problem by leveling the playing field. It allows defenders to get ahead in the arms race by developing and evaluating new botnet monitoring techniques and countermeasures. This is…

NEW TOOLSPython3PcapSpoofingPacket CaptureSnifferScapyPacket SnifferTraffic AnalysisARP SpoofingTraffic Interceptor

Espionage – A Network Packet And Traffic Interceptor For Linux. Spoof ARP & Wiretap A Network

Espionage is a network packet sniffer that intercepts large amounts of data being passed through an interface. The tool allows users to to run normal and verbose traffic analysis that shows a live feed of traffic, revealing packet direction, protocols, flags, etc. Espionage can also spoof ARP so, all data sent by the target gets redirected through the attacker (MiTM). Espionage supports IPv4, TCP/UDP, ICMP, and HTTP. Espionage was written in Python 3.8 but it also supports version 3.6. This is the first version…

NEW TOOLSScreenspy

Screenspy – Capture user screenshots using shortcut file (Bypass SmartScreen/Defender)

Capture user screenshots using shortcut file (Bypass SmartScreen/Defender). Suport Multi-monitorLegal disclaimer:Usage of ScreenSpy for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this programInstallgit clone screenspybash screenspy.shAuthor: : Screenspy

NEW TOOLSOffensive SecurityVBScriptMinifierMinifyVBSVBScript MinifierVBSmin

VBSmin – VBScript Minifier

VBScript minifierFeaturesRemove extra whitespace Trailing whitespaceLeading whitespaceBlank linesInline extra spacesRemove comments Single quote (start of the line)Single quote (inline)REMOne-line Line splitting (underscore)ColonQuick startQuick install$ gem install vbsminSee more install options.Default usage: CLI$ vbsmin samples/features.vbsOriginal file size: 344 bytesMinified file size: 244 bytesSize saved: 100 bytesOriginal file path: samples/features.vbsMinified file path: samples/features.min.vbsDefault usage: libraryrequire 'vbsmin'vm = VBSMin.newvm.minify('samples/features.vbs')Example of outputSo this chunk of script...' Get WMI Object.On Error Resume NextSet objWbemLocator = CreateObject _ ("WbemScripting.SWbemLocator")if Err.Number Then REM Display error WScript.Echo vbCrLf & "Error # "…