PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Mac

Deauthentication AttackMacMDK3Network-AttackerNEW TOOLSpenetration testing

Network-Attacker – WiFi Stress Testing Beacon Flooding & Deauthentication Attack

network-attacker V0.1 is a Wifi Stress Testing Bash Script Program Based on Mdk3 [Beacon Flooding & Deauthentication Attack] Created To Help Beginners And even Professionals For a eacon Flooding Or Deauthentication Attack On NetworksInstallationsudo apt-get install gitsudo git clone network-attackersudo chmod +x install.shsudo chmod +x network_attacker.sh./install.sh./network_attacker.shTested On :Backbox linuxUbuntuDebianKali linuxParrot osContactProgrammed By belahsan ouerghi Contact.Download Network-Attacker

CrawlerCrawlingInformation GatheringMacNEW TOOLSPhoton

Photon v1.1.4 – Incredibly Fast Crawler Designed For Recon

Incredibly Fast Crawler Designed For Recon.Key FeaturesData ExtractionPhoton can extract the following data while crawling:URLs (in-scope & out-of-scope)URLs with parameters (example.com/gallery.php?id=2)Intel (emails, social media accounts, amazon buckets etc.)Files (pdf, png, xml etc.)Secret keys (auth/API keys & hashes)JavaScript files & Endpoints present in themStrings matching custom regex patternSubdomains & DNS related dataThe extracted information is saved in an organized manner or can be exported as json.FlexibleControl timeout, delay, add seeds, exclude URLs matching a regex pattern and other cool stuff. The extensive range of options…

HashHashcodeMacNEW TOOLSPython3

Leaked? 2.0 – A Checking Tool For Hash Codes, Passwords And Emails Leaked

Leaked? is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses API from Aurelius Wendelken.Leaked? can work in any OS if they have support Python 3 and 2.What's new?Check email leakedUpdateMore friendly for usersSupport Python 2 and 3FeaturesCheck passwords leakedCheck hash code leakedCheck email leaked NEW!Update NEW!ExitAbout AuthorInstall and Run in Linuxsudo apt update && apt install python3 python3-pipgit clone Leakedpip3 install -r requirements.txtpip install -r requirements.txtpython3 leaked.pyor python leaked.pyInstall and…

Have I been pwnedIPTVJSONMacNEW TOOLSNode.jspwned

pwned – A command-line tool for querying the ‘Have I been pwned?’ service

A command-line tool for querying Troy Hunt's Have I been pwned? service using the hibp Node.js module.Installationnpm install pwned -gUsageUsage: pwned [option | command]Commands: ba [options] <account> get all breaches for an account (username or email address) breaches [options] get all breaches in the system breach [options] <name> get a single breached site by breach name dc [options] get all data classes in the system pa [options] <email> get all pastes for an account (email address)Each command has its own -h (--help) option.Options: -h,…

GNUMacMalware AnalysisNEW TOOLSVirtual Machine

Droidefense – Advance Android Malware Analysis Framework

Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that malware researcher have on they every day work. For those situations on where the malware has anti-analysis routines, Droidefense attemps to bypass them in order to get to the code and 'bad boy' routine. Sometimes those techniques can be virtual machine detection, emulator detection, self certificate checking, pipes detection. tracer pid check, and so on.Droidefense uses an innovative…

BINDHershellMacNEW TOOLSSocatTLS

Hershell – Simple TCP reverse shell written in Go

Simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint pinning feature, preventing from traffic interception.Supported OS are:WindowsLinuxMac OSFreeBSD and derivativesWhy ?Although meterpreter payloads are great, they are sometimes spotted by AV products.The goal of this project is to get a simple reverse shell, which can work on multiple systems,How ?Since it's written in Go, you can cross compile the source for the desired architecture.Building the payloadTo simplify things, you can use the…

DHCPEthernetEttercapLibPCAPMacMan-in-the-MiddleMITMNEW TOOLSScanSniffingSSHSSLstrip

Ettercap – A Comprehensive Suite For Man In The Middle Attacks

Ettercap is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.ETTERCAP OFFERS THREE INTERFACES, TRADITIONAL COMMAND LINE, GUI AND NCURSES.Supported DistributionsThese distributions have been tested in both 32 and 64 bit flavors where possibleDebian/Ubuntu (Includes derivatives such as Kali, BackTrack, Mint, etc)FedoraGentooPentooMac OSX (Snow Leopard & Lion)FreeBSDOpenBSDNetBSDUnsupported DistributionsInstallation may work…

Incident responseMacMac OS XNEW TOOLSOS XSimulationTraffic GeneratorWeb-Traffic-Generator

Web-Traffic-Generator – A Quick And Dirty HTTP/S “Organic” Traffic Generator

Just a simple (poorly written) Python script that aimlessly "browses" the internet by starting at pre-defined rootURLs and randomly "clicking" links on pages until the pre-defined clickDepth is met.I created this as a noise generator to use for an Incident Response / Network Defense simulation. The only issue is that my simulation environment uses multiple IDS/IPS/NGFW devices that will not pass and log simple TCPreplays of canned traffic. I needed the traffic to be as organic as possible, essentially mimicking real users browsing the…

Anonymity OnlineAnonymizingMacNEW TOOLSTORTor BrowserTor Browser Bundle

Tor Browser 8.0 – Everything you Need to Safely Browse the Internet

Tor Browser 8.0, is the first stable release based on Firefox 60 ESR, is now available from the Tor Browser Project page and also from distribution directory. This release is all about users first.Tor Browser 8.0 comes with a series of user experience improvements that address a set of long-term Tor Browser issues you’ve told us about. To meet our users' needs, Tor Browser has a new user onboarding experience; an updated landing page that follows our styleguide; additional language support; and new behaviors for…