HacKing Tools Downloader
Downloading HacKing Tools and exporting by categories to $HOME directory
GitHub
https://github.com/Anlominus/HacKing
#hacktools #pentest
Downloading HacKing Tools and exporting by categories to $HOME directory
GitHub
https://github.com/Anlominus/HacKing
#hacktools #pentest
🔥5
Vulmap is an open-source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also, they can be used for privilege escalation by pentesters/red teamers.
GitHub
https://github.com/vulmon/Vulmap
#hacktools
GitHub
https://github.com/vulmon/Vulmap
#hacktools
👍7
This github repository contains a collection of 125+ tools and resources that can be useful for red teaming activities
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
GitHub
#pentest #hacktools #useful
Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.
GitHub
#pentest #hacktools #useful
👍6🔥1
Tool-X – Single Click Installer For 70 Hacking Tools on Android
Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.
In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.
GitHub
Source
#hacktools #mobile
Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.
In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.
GitHub
Source
#hacktools #mobile
🔥5
Hades-C2
Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.
GitHub
#hacktools
Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.
GitHub
#hacktools
👍5
Hackers can remove 0 or add many 0s in IP address (where the octet is 0). This can bypass firewall for SSRF attack. Even decimal & hex can be combined in IP address by using IP-Obfuscator tool. So, cyber defenders should be aware of it.
#hacktools #web
#hacktools #web
👍3🔥2
PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.
GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub
Source
#hacktools
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.
GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub
Source
#hacktools
🤔5
GPT Vuln-analyzer
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.
This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.
GitHub
#pentest #hacktools
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.
This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.
GitHub
#pentest #hacktools
👍4
PentestGPT – A ChatGPT Powered Automated Penetration Testing Too
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.
To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.
GItHub
#hacktools #pentest
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.
To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.
GItHub
#hacktools #pentest
🔥8😢1
Social Engineering Attacks: Creating a Fake SMS Message
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
👍5
Above Network Vulnerability Scanner by Caster
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols
GitHub
#hacktools
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols
GitHub
#hacktools
👍3❤1
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
🔥9
PhoneSploit Pro - PhoneSploit with Metasploit Integration
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
👍7
Find Secrets such as API keys and Tokens for any domain.
A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)
GitHub
#hacktools
A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)
GitHub
#hacktools
👍4🤡1
Hack a Drone using Dronesploit
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.
GitHub
#hacktools
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.
GitHub
#hacktools
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
YaraToolkit v0.3
DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara
Official page
#hacktools #defensice
DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara
Official page
#hacktools #defensice
👍7
Faraday: Open Source Vulnerability Management Platform
Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.
Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:
⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards
❗️GitHub
Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт
#defensive #hacktools
Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.
Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:
⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards
❗️GitHub
Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт
#defensive #hacktools
👍5🤔3
Exploitivator: Automate Metasploit Scanning And Exploitation
❗️GitHub
⚠️HowTo usage + mirror
Дополнительно:
⛳️ Шпаргалка по командам
⛳️ Тест на проникновение с помощью Metasploit Framework
⛳️ Поиск уязвимостей с помощью OpenVAS в Metasploit
⛳️ Интеграция OpenVAS и Metasploit
⛳️ How to exploit using OpenVas & Metasploite
#pentest #metaslpoit #hacktools
❗️GitHub
⚠️HowTo usage + mirror
Дополнительно:
⛳️ Шпаргалка по командам
⛳️ Тест на проникновение с помощью Metasploit Framework
⛳️ Поиск уязвимостей с помощью OpenVAS в Metasploit
⛳️ Интеграция OpenVAS и Metasploit
⛳️ How to exploit using OpenVas & Metasploite
#pentest #metaslpoit #hacktools
🤝3❤1👍1