BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3.
Features of BruteDum
SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra (recommended)
SSH, FTP, Telnet, PostgreSQL, RDP, VNC...
CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom...
Recon-Tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from.
Features
Information Security Headers
WAF Detector
Banner Grabbing
Phone Number
Credit Card Number
Email
US Social Security Number
Url Crawl
Dom Paramter Url
Internal...
Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager).
When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...
PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.
Also, you can search a specific person in the image set, is necessary give to the application a few pictures of the person of interest.
Download PAnalizer
FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.
Features
FinalRecon provides detailed information such as:
Header Information
WHOIS
SSL Certificate Details
Found Flag in SSL Certificate -...
Sn1per Community Edition is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities. Sn1per Professional is Xero Security's premium reporting addon for Professional Penetration Testers, Bug Bounty Researchers and Corporate Security teams to...
A cross-platform tool that use Certificates Transparency logs to find subdomains. We currently support Linux, Windows and MacOS.
How it works?
It tool doesn't use the common methods for sub(domains) discover, the tool uses Certificate Transparency logs to find subdomains and it method make it...
WAFW00F identifies and fingerprints Web Application Firewall (WAF) products.
How does it work:
To do its magic, WAFW00F does the following:
Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.
If that is not successful, it sends a number of...
Miteru is an experimental phishing kit detection tool.
How it works
It collects phishy URLs from the following feeds:
CertStream-Suspicious feed via urlscan.io
OpenPhish feed via urlscan.io
PhishTank feed via urlscan.io
Ayashige feed
It checks each phishy URL whether it enables directory...
Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? only to find parameter forms, because...
Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
Just the code of my OSINT bot searching for sensitive data leaks on different paste sites.
Search terms:
credentials
private RSA keys
Wordpress configuration files
MySQL connect strings
onion links
links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX)
Keep in mind:
This...
Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible (.ino) Scripts based on User Input and then Starts a Listener in Metasploit-Framework if Required by the Script, in Summary ...
Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
sshd-poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that (you can create a pam module, or just add auth optional pam_exec.so quiet expose_authtok /bin/bash -c {read,-r,x};{echo,-e,"`env`\n$x"}>>somefile in a service configuration), not even the...
HiddenWall is a Linux kernel module generator for custom rules with netfilter. (block ports, Hidden mode, rootkit functions etc). The motivation: on bad situation, attacker can put your iptables/ufw to fall... but if you have HiddenWall, the attacker will not find the hidden kernel module that...