Download all the data on Shodan for a list of IP addresses
shodan ip download.py A Python script to lookup available information in Shodan for a list of IPs and save the data to a local file that can be processed using the Shodan CLI. Shodan...
Information Gathering / Network PenTest / Web Exploitation / Web Information Gathering
by do son · Published June 15, 2017 · Last modified November 10, 2017
shodan ip download.py A Python script to lookup available information in Shodan for a list of IPs and save the data to a local file that can be processed using the Shodan CLI. Shodan...
Information Gathering / Network PenTest / Vulnerability Analysis
by do son · Published June 8, 2017 · Last modified May 22, 2018
portSpider is a tool for scanning huge network ranges to find open ports and vulnerable services. This tool is not intended to scan one target, rather a whole IP range. (eg. 192.168.0.0/24) Most of...
Information Gathering / Vulnerability Analysis
by do son · Published June 3, 2017 · Last modified February 6, 2020
HellRaiser: Vulnerability Scanner How does it work? HellRaiser scan with nmap then correlates CPE’s found with cve-search to enumerate vulnerabilities. Install Install ruby, bundler, and rails. https://gorails.com/setup/ubuntu/16.04 Install redis-server and nmap. ...
Forensics / Information Gathering / Metasploit / Network PenTest / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published May 19, 2017 · Last modified November 20, 2022
We have filled the world of hackers with infinite fantasy and fear, but with the rise of technology and security in the field of progress, hacking technology has become increasingly common. In fact, network...
Information Gathering / Network PenTest / Sniffing & Spoofing / Wireless
by do son · Published May 16, 2017 · Last modified March 19, 2018
NETATTACK2 is a python script that scans and attacks local and wireless networks. Everything is super easy because of the GUI that makes it unnecessary to remember commands and parameters. FUNCTIONS SCANNING Scan your...
Information Gathering / Password Attacks
by do son · Published May 12, 2017 · Last modified July 29, 2017
A facecheck2.0.php script that its function would be to verify accounts on Facebook. I know there is such a script that can be useful for someone or his logic, I do not know who...
Information Gathering / Network PenTest / Web Information Gathering / WebApp PenTest
by do son · Published May 11, 2017 · Last modified July 29, 2017
FiercePhish FiercePhish is a full-fledged phishing framework to manage all phishing engagements. It allows you to track separate phishing campaigns, schedule sending of emails, and much more. The features will continue to be expanded...
Information Gathering / Network PenTest
by do son · Published May 3, 2017 · Last modified July 28, 2017
Rainmap is a web-based application that allows users to create, configure and run Nmap scans from within their browser. A wide range of Nmap options is available, though users only need to specify the...
Information Gathering / Network PenTest / Web Information Gathering / WebApp PenTest
by do son · Published April 21, 2017 · Last modified July 27, 2017
dns-brute.nse Attempts to enumerate DNS hostnames by brute force guessing of common subdomains. With the dns-brute.srv argument, dns-brute will also try to enumerate common DNS SRV records. traceroute-geolocation.nse Lists the geographic locations of each...
Information Gathering / Network PenTest
by do son · Published April 18, 2017 · Last modified March 18, 2018
Within the network of infiltration sometimes encounter situations, some port development tries to change the default port. So, on this topic, I am going guide you to find the default port number for a...
Information Gathering / Network PenTest / Web Information Gathering / WebApp PenTest
by do son · Published April 17, 2017 · Last modified July 26, 2017
Google Hacking the meaning of the original use of Google Google search engine to search for information technology and behavior, now refers to the use of various search engines to search for information technology...
Information Gathering / Network PenTest
by do son · Published April 16, 2017 · Last modified July 26, 2017
The tool can be targeted system patch installation and Microsoft vulnerability database for comparison, and then detect the potential of the target system is not fixed vulnerabilities. At the same time this tool will...
Information Gathering / Network PenTest / Smartphone PenTest / Sniffing & Spoofing / Vulnerability Analysis / Wireless
by do son · Published February 27, 2017 · Last modified May 21, 2018
ZANTI is a penetration testing tool for Android platform. It supports sniffing connected networks, man-in-the-middle attacks, port scanning, cookie acquisition and route security testing. The tool was developed by Israeli mobile security company Zimperium. In...
Information Gathering / Network PenTest
by do son · Published February 26, 2017 · Last modified January 29, 2020
nmap (“Network Mapper”) is an open-source tool for network exploration and security auditing. It was designed to rapidly scan large networks, although it works fine to scan single hosts. nmap uses raw IP packets...
Exploitation / Information Gathering / Maintaining Access / Network PenTest / Post Exploitation / Vulnerability Analysis / Web Exploitation / Web Information Gathering / Web Vulnerability Analysis / WebApp PenTest
by do son · Published December 21, 2016 · Last modified August 1, 2017
A penetration test (pentest for short) is a method of attacking a computer’s systems in the hope of finding weaknesses in its security. If the pentest successfully gains access, it shows that computer functionality...