WS-Attacker v1.8 – Modular Framework For Web Services Penetration Testing

WS-Attacker v1.8 - Modular Framework For Web Services Penetration Testing WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr University Bochum (http://nds.rub.de/ ) and the Hackmanit GmbH (http://hackmanit.de/ ).The basic idea behind WS-Attacker is to provide a functionality to load WSDL files

jwt-cracker – Simple HS256 JWT Token Brute Force Cracker

jwt-cracker - Simple HS256 JWT Token Brute Force Cracker Simple HS256 JWT token brute force cracker.Effective only to crack JWT tokens with weak secrets.Recommendation: Use strong long secrets or RS256 tokens.InstallWith npm:npm install --global jwt-crackerUsageFrom command line:jwt-cracker <token> [<alphabet>] [<maxLength>]Where:token: the full HS256 JWT token string to crackalphabet: the alphabet to use for the brute

lscript – This script will make your life easier, and of course faster

lscript - This script will make your life easier, and of course faster This is a script that automates many procedures about wifi penetration and hacking.FeaturesEnabling-Disabling interfaces faster Changing Mac faster Anonymizing yourself faster View your public IP faster View your MAC fasterTOOLSYou can install whichever tool(s) you want from within

Universal Radio Hacker – Investigate Wireless Protocols Like A Boss

Universal Radio Hacker - Investigate Wireless Protocols Like A Boss The Universal Radio Hacker is a software for investigating unknown wireless protocols. Features includehardware interfaces for common Software Defined Radioseasy demodulation of signalsassigning participants to keep overview of your datacustomizable decodings to crack even sophisticated encodings like CC1101 data whiteningassign labels to reveal the logic

Mercure – A Tool For Security Managers Who Want To Train Their Colleague To Phishing

Mercure - A Tool For Security Managers Who Want To Train Their Colleague To Phishing Mercure is a tool for security managers who want to teach their colleagues about phishing.What Mercure can do:Create email templatesCreate target listsCreate landing pagesHandle attachmentsLet you keep track in the Campaign dashboardTrack email reads, landing page visits and attachment execution.Harvest

BAF – Blind Attacking Framework

BAF - Blind Attacking Framework What is BAF ? it's a framework written in python [2.7] that is being made specially for blind attacking , ie : attacking random targets with common security issues , targets are generated by the hackers search engine shodan and vulnerable hosts are hacked in an automated way .

Faraday v2.6 – Collaborative Penetration Test and Vulnerability Management Platform

Faraday v2.6 - Collaborative Penetration Test and Vulnerability Management Platform Faraday is the Integrated Multiuser Risk Environment you were looking for! It maps and leverages all the knowledge you generate in real time, letting you track and understand your audits. Our dashboard for CISOs and managers uncovers the impact and risk being assessed by the audit in real-time without

Nmap 7.60 – Free Security Scanner For Network Exploration & Security Audits

Nmap 7.60 - Free Security Scanner For Network Exploration & Security Audits Nmap (Network Mapper) is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw