Category: Discovery


Fud 100% services packages ready for sales

We offer a monthly Crypter service to make your files undetectable encrypted! this is how it works: You zip the files you want to encrypt and send them to our email then we will encrypt and make your files/file fud 100% (undetectable by any antivirus) and send them back to your email! We offer 3 packages: Standard Prenium Ultimate All those packages offer some unique futures to encrypt your file!  


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

ArjunDiscoveryHTTPMacNEW TOOLSParameterParameter FinderParameter FuzzingParameter Scanner

Arjun v1.1 – HTTP Parameter Discovery Suite

FeaturesMulti-threading3 modes of detectionRegex powered heuristic scanningHuge list of 3370 parameter namesUsageNote: Arjun doesn't work with python < 3.4Discover parametersTo find GET parameters, you can simply do:python3 -u --getSimilarly, use --post to find POST parameters.Multi-threadingArjun uses 2 threads by default but you can tune its performance according to your network connection.python3 -u --get -t 22Delay between requestsYou can delay the request by using the -d option as follows:python3 -u --get -d 2Adding HTTP HeadersUsing the --headers switch will…

DiscoveryNEW TOOLSPost ExploitationPost-Exploitation ToolPowerViewSharpSploit

SharpSploit – A .NET Post-Exploitation Library Written In C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive .NET easier for red teamers.SharpSploit is named, in part, as a homage to the PowerSploit project, a personal favorite of mine! While SharpSploit does port over some functionality from PowerSploit, my intention is not at all to create a direct port of PowerSploit. SharpSploit will be it's own project, albeit with similar goals to PowerSploit.IntroYou'll find some details and motivations…

DiscoveryInformation GatheringNEW TOOLSScanSQLiSubdomain EnumerationVulnerability AssessmentVulnerability Scanner

Raccoon – A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning

Offensive Security Tool for Reconnaissance and Information Gathering.FeaturesDNS detailsDNS visual mapping using DNS dumpsterWHOIS informationTLS Data - supported ciphers, TLS versions, certificate details and SANsPort ScanServices and scripts scanURL fuzzing and dir/file detectionSubdomain enumeration - uses Google dorking, DNS dumpster queries, SAN discovery and bruteforceWeb application data retrieval: CMS detectionWeb server info and X-Powered-Byrobots.txt and sitemap extractionCookie inspectionExtracts all fuzzable URLsDiscovers HTML formsRetrieves all Email addressesDetects known WAFsSupports anonymous routing through Tor/ProxiesUses asyncio for improved performanceSaves output to files - separates targets by folders…

DiscoveryMacNEW TOOLSScrapingSubdomain BruteSubdomain BruteforcingSubdomain Discovery ToolSubdomain EnumerationSubdomain ScannerSubdomain Takeover

SubFinder – A Subdomain Discovery Tool That Discovers Valid Subdomains For Websites

SubFinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple modular architecture and has been aimed as a successor to sublist3r project. SubFinder uses Passive Sources, Search Engines, Pastebins, Internet Archives, etc to find subdomains and then it uses a permutation module inspired by altdns to generate permutations and resolve them quickly using a powerful bruteforcing engine. It can also perform plain bruteforce if needed. The tool is highly customizable, and the code…

BurpBurp SuiteCloudFlareDiscoverDiscoveryMacNEW TOOLSPython3RhinoSleuthQLSQLsql injection

SleuthQL – Burp History Parsing Tool To Discover Potential SQL Injection Points

SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax. Once identified, SleuthQL will then insert SQLMap identifiers (*) into each parameter where the SQL-esque variables were identified.Supported Request TypesSleuthQL requires an export of Burp's Proxy History. To gain this export, simply navigate to your proxy history tab, highlight every item and click "Save Items". Ensure that each request is saved using base64 encoding. When SleuthQL scans the proxy history file, outside of the regular URL parameters, it will be…

CrawlingDiscoveryFile SharingFileshareMacNetwork AnalysisNEW TOOLSNmapNmap ScriptsScanSharesnifferSnifferSniffing

Sharesniffer – Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems

sharesniffer is a network analysis tool for finding open and closed file shares on your local network. It includes auto-network discovery and auto-mounting of any open cifs and nfs shares.How to useExample to find all hosts in network and auto-mount at /mnt:python -l 4 --hosts -a -m /mntRequirementsPython 2.7 or 3.5Linux or macOSNmap in PATHNmap scripts (.nse) in PATH (on Linux/macOS they are usually in /usr/local/share/nmap/), if you don't have the ones required are also in the rootdir of sharesniffer.python-nmap…

DiscoveryEmailsGathering Email InformationNEW TOOLSSamurai

Samurai Email Discovery – Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name

SED is a email discovery framework created 100% in BASH that grabs emails via google dork, company name, or domain name.Requirementsapt-install lynxScreenshotsPossibly more features such as an OSINT options, and credential reuse discovery & torsocks implimented - but it does the trick for now.Twitter: @0x3curity.Team: @AnonyInfoDownload Samurai

DiscoveryMacNEW TOOLSReconaissanceSubdomain BruteforcingSubdomain Discovery ToolSubdomain EnumerationSubdomain ScannerSubfinder

Subfinder – Subdomain Discovery Tool That Can Discover Massive Amounts Of Valid Subdomains For Any Target

SubFinder is a subdomain discovery tool that uses various techniques to discover massive amounts of subdomains for any target. It has been aimed as a successor to the sublist3r project. SubFinder uses Passive Sources, Search Engines, Pastebins, Internet Archives, etc to find subdomains and then it uses a permutation module inspired by altdns to generate permutations and resolve them quickly using a powerful bruteforcing engine. It can also perform plain bruteforce if needed. The tool is highly customizable, and the code is built with…

AWSDiscoverygoGetBucketMacNEW TOOLSpenetration testingPenetration Testing ToolS3Testing ToolWordlist

goGetBucket – A Penetration Testing Tool To Enumerate And Analyse Amazon S3 Buckets Owned By A Domain

When performing a recon on a domain - understanding assets they own is very important. AWS S3 bucket permissions have been confused time and time again, and have allowed for the exposure of sensitive material.What this tool does, is enumerate S3 bucket names using common patterns I have identified during my time bug hunting and pentesting. Permutations are supported on a root domain name using a custom wordlist. I highly recommend the one packaged within AltDNS.The following information about every bucket found to exist…