Category: NEW TOOLS


Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

KaliKali LinuxKali Linux HackingLinux ToolsNEW TOOLSTermuxTermux HackingTermux ToolTool-XTools InstallerUbuntu

Tool-X – A Kali Linux Hacking Tool Installer

What is Tool-X ?Tool-X is a kali linux hacking Tool installer. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best hacking tools in Rooted or Non Rooted Android devices. In the Tool-X there are almost 240 hacking tools available for termux app and GNURoot Debian terminal. you can install any tool by single click. Tool-X is Specially made for Termux and GNURoot Debian Terminal. Now Tool-X is available for Ubuntu.How to use ?Type 0 : To install all…

ChromecastCrashcast-ExploitNEW TOOLSShodan

Crashcast-Exploit – This Tool Allows You Mass Play Any YouTube Video With Chromecasts Obtained From

This tool allows you to mass play any YouTube video with Chromecasts obtained from Shodan.ioAuthor: @037PrerequisitesThe only thing you need installed is Python 3.xsudo apt-get install python3You also require to have cURL installedsudo apt-get install curlYou also require Shodan python modulepip install shodanUsing Shodan APIThis tool requires you to own an upgraded Shodan APIYou may obtain one for free in Shodan if you sign up using a .edu emailDownload Crashcast-Exploit


NSA to release its GHIDRA reverse engineering tool for free

The United States' National Security Agency (NSA) is planning to release its internally developed reverse engineering tool for free at the upcoming RSA security conference 2019 that will be held in March in San Francisco. The existence of the framework, dubbed GHIDRA, was first publicly revealed by WikiLeaks in CIA Vault 7 leaks, but the tool once again came to light after Senior NSA Adviser Robert Joyce announced to publicly release the tool for free in his RSA Conference session description. Reverse engineering tool is a disassembler, for…

Command LineExrexMacNEW TOOLSRegular Expressions

Exrex – Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular expression and more. It's pure python, without external dependencies.There are regular expressions with infinite matching strings (eg.: [a-z]+), in these cases exrex limits the maximum length of the infinite parts.Exrex uses generators, so the memory usage does not depend on the number of matching strings.FeaturesGenerating all matching stringsGenerating a random matching stringCounting the number of matching stringsSimplification of regular expressionsInstallationTo install exrex,…

MacNEW TOOLSSecurity AutomationSecurity ResearchSecurity ScannerShodanShodan APIShodan CLIShodan ScriptsShodan ToolShodanploitShodansploitSSH

Shodanploit – Shodan Command Line Interface Written In Python

Shodan is a search engine on the internet where you can find interesting things all over the world. For example, we can find cameras, bitcoin streams, zombie computers, ports with weakness in service, SCADA systems, and more. Moreover, more specific searches are possible. As a result of the search, Shodan shows us the number of vulnerable hosts on Earth.So what does shodansploit do ?With Shodan Exploit, you will have all your calls on your terminal. It also allows you to make detailed searches. All…

DiscoverLANLAN Automation ToolMacNEW TOOLSPRETPRETty

PRETty – “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each individual printer, PRETty will automatically discover and run choosen PRET payloads against all printers on the target network. Additionally, PRETty can be used to automate command/payload delivery to any given list of printers (See the "Lists" section)GUIDE:InstallationInstall PRET and all required dependenciesInstall requirements: sudo pip install termcolorNavigate to where you installed PRET: cd $PRETInstall PRETty into PRET: git clone ;

BeEFCommand LineJavaScriptJS ShellJSShellMacNEW TOOLSRemote Code Execution

JSShell – An Interactive Multi-User Web JS Shell

An interactive multi-user web based javascript shell. It was initially created in order to debug remote esoteric browsers during experiments and research. This tool can be easily attached to XSS (Cross Site Scripting) payload to achieve browser remote code execution (similar to the BeeF framework).Version 2.0 is created entirely from scratch, introducing new exciting features, stability and maintainability.AuthorDaniel Abeles.Shell VideoFeaturesMulti client supportCyclic DOM objects supportPre flight scriptsCommand Queue & ContextExtensible with PluginsInjectable via <script> tagsDumping command output to fileShell paginationInstallation & SetupConfig FileIn the…

KaliKali LinuxKalitorifyNEW TOOLSTORTor NetworkTor ProjectTorifyWhonix

Kalitorify – Transparent Proxy Through Tor For Kali Linux OS

kalitorify is a shell script for Kali Linux which use iptables settings for transparent proxy through Tor, the program also allows you to perform various checks like checking the external ip, or if Tor has been configured correctly.What is Transparent Proxy?Also known as an intercepting proxy, inline proxy, or forced proxy, a transparent proxy intercepts normal communication at the network layer without requiring any special client configuration. Clients need not be aware of the existence of the proxy. A transparent proxy is normally located…

Crafted TokensCSRFCSRF AttacksCSRF scannerCSRF TokensNEW TOOLSToken GenerationXSRFXSRFProbe

XSRFProbe – The Prime Cross Site Request Forgery Audit And Exploitation Toolkit

XSRFProbe is an advanced Cross Site Request Forgery (CSRF/XSRF) Audit and Exploitation Toolkit. Equipped with a Powerful Crawling Engine and Numerous Systematic Checks, it is now able to detect most cases of CSRF vulnerabilities, their related bypasses and futher generate (maliciously) exploitable proof of concepts with each found vulnerability. For more info on how XSRFProbe works, see XSRFProbe Internals on wiki.Some Features:Performs several types of checks before declaring an endpoint as vulnerable.Can detect several types of Anti-CSRF tokens in POST requests.Features a powerful crawler…