Tool-X – Single Click Installer For 70 Hacking Tools on Android
Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.
In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.
GitHub
Source
#hacktools #mobile
Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.
In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.
GitHub
Source
#hacktools #mobile
🔥5
Hades-C2
Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.
GitHub
#hacktools
Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.
GitHub
#hacktools
👍5
Hackers can remove 0 or add many 0s in IP address (where the octet is 0). This can bypass firewall for SSRF attack. Even decimal & hex can be combined in IP address by using IP-Obfuscator tool. So, cyber defenders should be aware of it.
#hacktools #web
#hacktools #web
👍3🔥2
PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.
GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub
Source
#hacktools
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.
GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub
Source
#hacktools
🤔5
GPT Vuln-analyzer
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.
This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.
GitHub
#pentest #hacktools
This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.
This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.
GitHub
#pentest #hacktools
👍4
PentestGPT – A ChatGPT Powered Automated Penetration Testing Too
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.
To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.
GItHub
#hacktools #pentest
PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.
To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.
GItHub
#hacktools #pentest
🔥8😢1
Social Engineering Attacks: Creating a Fake SMS Message
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.
Let’s take a look at how you can send fake SMS messages.
GitHub
Article
#hacktools
👍5
Above Network Vulnerability Scanner by Caster
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols
GitHub
#hacktools
Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols
GitHub
#hacktools
👍3❤1
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.
GitHub
Review
Awesome Burp Extensions
#web #hacktools
🔥9
PhoneSploit Pro - PhoneSploit with Metasploit Integration
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.
GitHub
#pentest #hacktools #metasploit #mobile
👍7
Find Secrets such as API keys and Tokens for any domain.
A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)
GitHub
#hacktools
A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)
GitHub
#hacktools
👍4🤡1
Hack a Drone using Dronesploit
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.
GitHub
#hacktools
This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.
GitHub
#hacktools
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
YaraToolkit v0.3
DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara
Official page
#hacktools #defensice
DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara
Official page
#hacktools #defensice
👍7
Faraday: Open Source Vulnerability Management Platform
Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.
Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:
⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards
❗️GitHub
Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт
#defensive #hacktools
Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.
Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:
⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards
❗️GitHub
Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт
#defensive #hacktools
👍5🤔3
Exploitivator: Automate Metasploit Scanning And Exploitation
❗️GitHub
⚠️HowTo usage + mirror
Дополнительно:
⛳️ Шпаргалка по командам
⛳️ Тест на проникновение с помощью Metasploit Framework
⛳️ Поиск уязвимостей с помощью OpenVAS в Metasploit
⛳️ Интеграция OpenVAS и Metasploit
⛳️ How to exploit using OpenVas & Metasploite
#pentest #metaslpoit #hacktools
❗️GitHub
⚠️HowTo usage + mirror
Дополнительно:
⛳️ Шпаргалка по командам
⛳️ Тест на проникновение с помощью Metasploit Framework
⛳️ Поиск уязвимостей с помощью OpenVAS в Metasploit
⛳️ Интеграция OpenVAS и Metasploit
⛳️ How to exploit using OpenVas & Metasploite
#pentest #metaslpoit #hacktools
🤝3❤1👍1
Изменения в облаке тегов:
[+] Добавлены новые теги:
#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий
[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
[+] Добавлены новые теги:
#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий
[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
👍9👀2🫡2🤔1
A curated list of amazingly awesome Burp Extensions
See also:
#web #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
Evil-Cardputer - Wi-Fi Spycam detection and CCTV Toolkit
Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit?📸
A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!
✨ Key features (v1.4.3)
💎 CCTV Toolkit: LAN/WAN IP-camera recon → port scan, brand fingerprint + CVE hints, login finder, default-creds test, stream discovery, reporting.
💎 MJPEG Viewer: cycle through discovered MJPEG streams, adjust resolution/compression.
💎 Spycam Detector: detect hidden Wi-Fi cameras via SSID/OUI heuristics that know for being SpyCamera.
Enjoy & hack responsibly!🎉 🥳🔥
➡️ GitHub
📱 Wiki
📔 Official page
#privacy #hacktools
Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit?
A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!
✨ Key features (v1.4.3)
Enjoy & hack responsibly!
#privacy #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤4😁2😱1
AutoExploits by AI
Welcome to AutoExploit AI, the modern engine for create exploit by AI
💀 Source
#AI #hacktools
Welcome to AutoExploit AI, the modern engine for create exploit by AI
#AI #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7👍2😱1