Eternal – An internet scanner for Eternal Blue [exploit CVE-2017-0144]

Eternal - An internet scanner for Eternal Blue [exploit CVE-2017-0144] Eternal scanner is a network scanner for Eternal Blue exploit CVE-2017-0144.Requirementsmasscanmetasploit-frameworkHow to Installgit clone https://github.com/peterpt/eternal_scanner.gitcd eternal_scanner && ./escanOR ./escan -h (to change scanner speed)Install Requirementsapt-get install masscan metasploit-frameworkScreenshotsDownload

Prowler – Tool for AWS Security Assessment, Auditing And Hardening

Prowler - Tool for AWS Security Assessment, Auditing And Hardening Tool based on AWS-CLI commands for AWS account security assessment and hardening, following guidelines of the CIS Amazon Web Services Foundations Benchmark 1.1FeaturesIt covers hardening and security best practices for all AWS regions related to:Identity and Access Management (24 checks)Logging (8 checks)Monitoring (15 checks)Networking (5

Hardentools – Utility that disables a number of risky Windows features

Hardentools - Utility that disables a number of risky Windows features Hardentools is a collection of simple utilities designed to disable a number of features exposed by operating systems (Microsoft Windows, for now), and primary consumer applications. These features, commonly thought for Enterprise customers, are generally useless to regular users and rather pose as dangers

NagaScan – NagaScan is a distributed passive scanner for Web application.

NagaScan - NagaScan is a distributed passive scanner for Web application. What is NagaScanNagaScan is a distributed passive vulnerability scanner for Web application.What NagaScan doNagaScan currently support some common Web application vulnerabilities, e.g. XSS, SQL Injection, File Inclusion etcHow NagaScan workConfig a proxy, e.g. Web Browser proxy or mobile Wi-Fi proxy, the traffic (including requests

DropboxC2C – A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations

DropboxC2C - A Post-Exploitation Agent Which Uses Dropbox Infrastructure For Command And Control Operations DropboxC2C is a post-exploitation agent which uses Dropbox Infrastructure for command and control operations.DO NOT USE THIS FOR MALICIOUS PURPOSES. THE AUTHOR IS NOT RESPONSIBLE FOR ANY MISUSE OF THIS PROGRAM.Structuremain.py - The server part which manages all the agents.agent.py -

GPS-SDR-SIM – Software-Defined GPS Signal Simulator

GPS-SDR-SIM - Software-Defined GPS Signal Simulator GPS-SDR-SIM generates GPS baseband signal data streams, which can be converted to RF using software-defined radio (SDR) platforms, such as bladeRF, HackRF, and USRP.Windows build instructionsStart Visual Studio.Create an empty project for a console application.On the Solution Explorer at right, add gpssim.c and getopt.c to the Souce Files folder.Select

SET v7.7 – The Social-Engineer Toolkit “Blackout”

SET v7.7 - The Social-Engineer Toolkit “Blackout” The Social-Engineer Toolkit (SET) was created and written by the founder of TrustedSec. It is an open-source Python-driven tool aimed at penetration testing around Social-Engineering. SET has been presented at large-scale conferences including Blackhat, DerbyCon, Defcon, and ShmooCon. With over two million downloads, SET is the standard for

nWatch – Tool for Host Discovery, PortScanning and Operating System Fingerprinting

nWatch - Tool for Host Discovery, PortScanning and Operating System Fingerprinting nWatch is a handy tool for host discovery, portscanning and operating system fingerprinting.Demo videoRequirementsnmapscapycoloramactypesInstallation and executionInstall the requirements Then you can download nWatch by cloning the Git repository:git clone https://github.com/suraj-root/nWatch.gitcd nWatch/python nwatch.py For educational purposes only.Download