PRINT
PRINT
SEND MAIL
SEND MAIL

Tag: framework

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

Antivirus EvasionKaliNEW TOOLSRubyVeilVeil-Evasion

Veil – Tool To Generate Metasploit Payloads That Bypass Common Anti-virus Solutions

Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions.Veil is current under support by @ChrisTruncerSoftware Requirements:The following OSs are officially supported:Debian 8+Kali Linux Rolling 2018.1+The following OSs are likely able to run Veil:Arch LinuxBlackArch LinuxDeepin 15+ElementaryFedora 22+Linux MintParrot SecurityUbuntu 15.10+SetupKali's Quick Installapt -y install veil/usr/share/veil/config/setup.sh --force --silentGit's Quick InstallNOTE:Installation must be done with superuser privileges. If you are not using the root account (as default with Kali Linux), prepend commands with sudo or change to the root user before…

ARMAssemblerDisassemblerELFEmulatorIntermediate RepresentationMiasmMIPSNEW TOOLSReverse EngineeringShellcodesSymbolic Execution

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs. Here is a non exhaustive list of features:Opening / modifying / generating PE / ELF 32 / 64 LE / BE using ElfesteemAssembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430Representing assembly semantic using intermediate languageEmulating using JIT (dynamic code analysis, unpacking, ...)Expression simplification for automatic de-obfuscation...See the official blog for more examples and demos.Basic examplesAssembling / DisassemblingImport Miasm x86…

Command InjectionIntelligence GatheringNEW TOOLSPort ScannerTIDoS FrameworkVulnerability AnalysisWeb Penetration Testingweb-application-security

TIDoS-Framework v1.7 – The Offensive Manual Web Application Penetration Testing Framework

TIDoS Framework is a comprehensive web-app audit framework. let's keep this simpleHighlights :-The main highlights of this framework is:TIDoS Framework now boasts of a century+ of modules.A complete versatile framework to cover up everything from Reconnaissance to Vulnerability Analysis.Has 5 main phases, subdivided into 14 sub-phases consisting a total of 104 modules.Reconnaissance Phase has 48 modules of its own (including active and passive recon, information disclosure modules).Scanning & Enumeration Phase has got 15 modules (including port scans, WAF analysis, etc)Vulnerability Analysis Phase has 36…

AndrospyBackdoor CrypterNEW TOOLS

Androspy – Backdoor Crypter & Creator With Automatic IP Poisener

Androspy : is Backdoor Crypter & Creator with Automatic IP Poisener Coded By Belahsan OuerghiDependencieskeytooljarsignerApache2Metasploit-FrameworkxtermInstallationsudo apt-get install gitgit clone Androspychmod +x setup.shsudo ./setup.shchmod +x androspy.shsudo ./androspy.shTested on :BackBox LinuxKali linuxParrot osContactContact - Tunisian Eagles[Email] - tunisianeagles@protonmail.com - TunisianEaglesWebsite - TunisianEaglesDownload Androspy

DamnDVWAInformation SecurityNEW TOOLSNovahotpenetration testingVulnerable ApplicationWebShell

Novahot – A Webshell Framework For Penetration Testers

novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written in any language. By default, it ships with trojans written in PHP, ruby, and python.Beyond executing system commands, novahot is able to emulate interactive terminals, including mysql, sqlite3, and psql. It additionally implements "virtual commands" that make it possible to upload, download, edit, and view remote files locallly using your preferred applications.InstallationInstall the executable directly from npm:[sudo] npm install -g novahotThen seed a config file:novahot…

Brute-forceCaptive PortalEvil TwinKaliMacMac ChangerNEW TOOLSPcapPenetration TestSniffAirTP-LINKWPA2

SniffAir – A Framework For Wireless Pentesting

SniffAir is an open-source wireless security framework which provides the ability to easily parse passively collected wireless data as well as launch sophisticated wireless attacks. SniffAir takes care of the hassle associated with managing large or multiple pcap files while thoroughly cross-examining and analyzing the traffic, looking for potential security flaws. Along with the prebuilt queries, SniffAir allows users to create custom queries for analyzing the wireless data stored in the backend SQL database. SniffAir is built on the concept of using these queries…

Hacking Toolspenetration testingTUTORIALS

Xerosploit- A Man-In-The-Middle Attack Framework

Networking is an important platform for an Ethical Hacker to check on, many of the threat can come from the internal network like network sniffing, Arp Spoofing, MITM e.t.c, This article is on Xerosploit which provides advanced MITM attack on your local network to sniff packets, steal password etc. Table of Content Introduction to Xerosploit Man-In-The-Middle Xerosploit Installation PSCAN (Port Scanner) DOS (Denial of service) INJECTHTML (HTML INJECTION) SNIFF dspoof YPLAY REPLACE Driftnet Introduction to Xerosploit Xerosploit is a penetration testing toolkit whose goal…

Command LineLightweight frameworkMacMac OS XNEW TOOLSOS XPython-Nubia

Python-Nubia – A Command-Line And Interactive Shell Framework

Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell (aka. ldshell)” at Facebook. Since then it was factored out to be a reusable component and several internal Facebook projects now rely on it as a quick and easy way to get an intuitive shell/cli application without too much boilerplate.Nubia is built on top of python-prompt-toolkit which is a fantastic toolkit for building interactive command-line applications.Disclaimer: Nubia is beta for non-ldshell use-cases. Some of…

Dictionary AttackExploitation FrameworkMacNEW TOOLSpenetration testingPython3Router Exploitation FrameworkRoutersploit Framework

RouterSploit v3.4.0 – Exploitation Framework For Embedded Devices

The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.It consists of various modules that aids penetration testing operations:exploits - modules that take advantage of identified vulnerabilitiescreds - modules designed to test credentials against network servicesscanners - modules that check if a target is vulnerable to any exploitpayloads - modules that are responsible for generating payloads for various architectures and injection pointsgeneric - modules that perform generic attacksInstallationRequirementsRequired:futurerequestsparamikopysnmppycryptoOptional:bluepy - bluetooth low energyInstallation on Kali Linuxapt-get install python3-pipgit clone routersploitpython3 -m pip…