pymultitor – Python Multi Threaded Tor Proxy

pymultitor - Python Multi Threaded Tor Proxy Did you ever want to be at two different places at the same time?While performing penetration tests there are often problems caused by security devices that block the attacking IP.With a large number of IP addresses performing the attacks, better results are guaranteed - especially when

Heimdall – Manage Vulnerables Packages in your *nix Servers (in a centralized way)

Heimdall - Manage Vulnerables Packages in your *nix Servers (in a centralized way) It's a tool to manage vulnerables packages in your *nix servers, in a centralized way.How to installgit clone https://github.com/mthbernardes/heimdall_webserver.gitcd heimdall_webserverchmod +x install.sh./install.shpython manage.py runserver 0.0.0.0:1337The default credentials are heimdall:heimdall (CHANGE THAT)How it works1. Install and configure the Heimdall web platform(heimdall_webserver) on a

Domain Hunter – Checks Expired Domains, Bluecoat Categorization, And Archive.Org History To Determine Good Candidates For Phishing

Domain Hunter - Checks Expired Domains, Bluecoat Categorization, And Archive.Org History To Determine Good Candidates For Phishing Domain name selection is an important aspect of preparation for penetration tests and especially Red Team engagements. Commonly, domains that were used previously for benign purposes and were properly categorized can be purchased for only a few dollars.

DATA – Credential Phish Analysis and Automation

DATA - Credential Phish Analysis and Automation Credential Phish Analysis and AutomationBUCKLEGRIPPER (py)Given a suspected phishing url or file of line separated urls, visit, screenshot, and scrape for interesting files.Requirements can be installed by running or reviewing install_bucklegripper_deps.shusage: bucklegripper.py [-h] [-u URL] [-s SOURCE] [-r READFILE] [-a USERAGENT]Visit a suspected phishing page, screenshot it and

BruteSploit – Collection Of Method For Automated Generate, Bruteforce And Manipulation Wordlist

BruteSploit - Collection Of Method For Automated Generate, Bruteforce And Manipulation Wordlist BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be used during a penetration test to enumerate and can be used in CTF for manipulation,combine,transform and permutation some words or file text.Tutorial Check in

PRET – Printer Exploitation Toolkit

PRET - Printer Exploitation Toolkit PRET is a new tool for printer security testing developed in the scope of a Master's Thesis at Ruhr University Bochum. It connects to a device via network or USB and exploits the features of a given printer language. Currently PostScript, PJL and PCL are supported which are spoken by

InjectProc – Process Injection Techniques

InjectProc - Process Injection Techniques Process injection is a very popular method to hide malicious behavior of code and are heavily used by malware authors.There are several techniques, which are commonly used: DLL injection, process replacement (a.k.a process hollowing), hook injection and APC injection.Most of them use same Windows API functions: OpenProcess, VirtualAllocEx,