The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices. It consists of various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules...
Wirespy Automate Man In The Middle Attacks (MITMAs) over WiFi. Wirespy allows attackers to set up quick honeypots to carry out MITMAs. Monitoring and logging functionalities are implemented in order to keep records of...
ExchangeRelayX An NTLM relay tool to the EWS endpoint for on-premise exchange servers. Provides an OWA for hackers. Version 1.0.0. This tool is a PoC to demonstrate the ability of an attacker to perform...
Weevely is a web shell designed for remote server administration and penetration testing that can be extended over the network at runtime with more than 30 modules. It executes remote code via an obfuscated...
Bashark Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. Features Single Bash script Lightweight and fast Multi-platform: Unix, OSX, Solaris etc. No external dependencies Immune to heuristic and behavioral...
PyLazyS3 A Python port of the original lazys3 tool to enumerate AWS S3 buckets using different permutations, originally created by @NahamSec. It utilizes the asyncio and aiohttp libraries to handle multiple high concurrency requests with great efficiency. Installation git clone https://github.com/Den1al/PyLazyS3.git...
SSRFmap A simple service scanner for Server Side Request Forgery vulnerabilities. Installation git clone https://github.com/dreadlocked/SSRFmap.git cd SSRFmap bundle install Use Usage examples Request a single resource via GET request ruby ssrfmap.rb –url http://www.example.com/controller?url=_SSRF_ –target http://169.254.169.254/...
Danger zone Correlate data between domains, ips and email addresses, present it as a graph and store everything into Elasticsearch and JSON files. Cases Based on given email, check for associate domains and then...
LogRM LogRM is a post-exploitation powershell script which it uses windows event logs to gather information about the internal network in a penetration testing engagement. It is not only useful for blue teams but...
GhostTunnel GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device only to release the payload (agent), then the HID...
WiFi Miner Detector Overview A tool for detecting malicious WiFi with mining cryptocurrency. Some weeks ago I read a news “Starbucks Wi-Fi Hijacked People’s Laptops to Mine Cryptocurrency“. The attackers inject the CoinHive javascript...
ReconDog Recon Dog is an all in one tool for all your basic information gathering needs. It uses APIs to gather all the information so your identity is not exposed. Main Features Wizard +...
1Gixy is a tool to analyze Nginx configuration. The main goal of Gixy is to prevent security misconfiguration and automate flaw detection. Currently supported Python versions are 2.7 and 3.5+. Right now Gixy can...
Internet Of Things Exploitation Framework Expliot is a framework for security testing IoT and IoT infrastructure. It provides a set of plugins (test cases) and can be extended easily to create new plugins. Changelog...