Linux Kodachi operating system is based on Debian 8.6 it will provide you with a secure, anti forensic, and anonymous operating system considering all features that a person who is concerned about privacy would need to have in order to be secure.Kod…
Credmap is an open source tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these. An official int…
Noriben is a Python-based script that works in conjunction with Sysinternals Procmon to automatically collect, analyze, and report on runtime indicators of malware. In a nutshell, it allows you to run your malware, hit a keypress, and get a simple text…
This script was built and test on Kali-Linux and should work on any linux distribution
pip install termcolor
Setup VPN server on localip and redirect traffic sent from the clients (80,443) to proxy 192.168.1.10:8080
$sudo python vproxy.py -localip 192.168.1.9 -phost 192.168.1.10 -pport 8080 -port 80,443
- Help Penetration Testers conduct mobile security assessment easier
- Intercept Mobile HTTP/S traffic from any mobile device
Configuring VPN Videos
backdoorppt – ‘Office spoof extensions tool’
Version release: v1.5-Stable
Distros Supported: Linux Kali, Ubuntu, Mint
Author: pedro ubuntu [ r00t-3xp10it ]
Suspicious-Shell-Activity© (SSA) RedTeam develop @2017
Simple script that allow users to add a ms-word icon to one
existing executable.exe (using resource-hacker as backend appl)
and a ruby one-liner command that will hidde the .exe extension
and add the word doc .ppt extension to the end of the file name.
Spoof extension methods
backdoorppt tool uses 2 diferent extension spoof methods:
'Right to Left Override' & 'Hide Extensions for Known File Types'
Edit the 'settings' file to chose what method should be used..
cd backdoorppt && nano settings
Dependencies (backend applications required)
xterm, wine, ruby, ResourceHacker(wine)
'backdoorppt script will work on wine 32 or 64 bits'
'it also installs ResourceHacker under .../.wine/Program Files/.. directorys'
1º - backdoorppt only supports windows binarys to be transformed (.exe -> .ppt)
2º - backdoorppt requires ResourceHacker installed (wine) to change the icons
3º - backdoorppt present you 6 available diferent icons (.ico) to chose from
4º - backdoorppt does not build real ms-word doc files, but it will transform
your payload.exe to look like one word doc file (social engineering).
Backdoorppt 1º run (Kali distros)
Backdoorppt working (Kali distros)
transformed files on-target system (windows)
Target user thinks they are opening a word document file,
but in fact they are executing one binary payload insted.
Credits: Damon Mohammadbagher
A lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming tasks. This is a Ubuntu VM tailored for hardware hacking, RE and Wargaming. Tools included Pwndbg Pwntools Binwalk Radare2 …
Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please down…
__ _ ____ ____ ___ _________ _/ /_(_) _____ / __ \/ __ \/ _ \/ ___/ __ `/ __/ / | / / _ \/ /_/ / /_/ / __/ / / /_/ / /_/ /| |/ / __/\____/ .___/\___/_/ \__,_/\__/_/ |___/\___/ /_/ This is a fram…
crackle cracks BLE Encryption (AKA Bluetooth Smart). crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing proces…
The OWASP Security Shepherd Project is a web and mobile application security training platform. Security Shepherd has been designed to foster and improve security awareness among a varied skill-set demographic. The aim of this project…
Commix (short for [ comm ]and [ i ]njection e[ x ]ploiter) is an automated tool written by Anastasios Stasinopoulos ( @ancst ) that can be used from web developers, penetration testers or even securi…
A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules permanently as daemon on your server like autopwn2. Although it gives you the ability to remotely use the msfrpc…
PulledPork for Snort and Suricata rule management (from Google code) Features and Capabilities Automated downloading, parsing, state modification and rule modification for all of your snort rulesets. Checksum verification for all…
SPARTA is a python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase. It allows the tester to save time by having point-and-click access to his toolkit and…
Example of task automation using Faraday Plugin – Running ping for every host that has a service on port 22
We also added a menu option to run directly from GTK!
New menu item in GTK allows users to run Fplugin without having to type anything!
Read more about FPlugin in our documentation
Details are everything
And that is what this release is all about. We believe that correcting very specific details and introducing small improvements also adds quality and efficiency to a platform like ours. So it is in those items that we focused on the last iteration.
- Added LDAP support for authentication
- Removed grouping by issue tracker option in status report
- Added command line option to automatically install the license files before launching Faraday
- Fixed bug when editing workspaces with maximum allowed workspaces reached
- Improved login in Web UI
- Improved the validation applied to passwords when editing them in the Web UI
Better password validation
- Improved UX in users list Web UI
- Improved GTK UX when the client loses connection to the server
- Added link to name column in Hosts list
Host names with links
- Fixed bug in SQLMap plugin that made the client freeze
- Fixed bug when creating/updating Credentials
- Fixed bug in the WEB UI – menu explanation bubbles were hidden behind inputs
- Fixed conflict resolution when the object was deleted from another client before resolving the conflict
- Improved FPlugin
- Improved the installation process
- Improved SQLMap plugin to support –tables and –columns options
- Improved navigation in Web UI
- Merged PR #137 – CScan improvements: bug fixing, change plugin format and removed unnecessary file output
- Merged PR #173 – Hostnames: added hostnames to plugins
- Merged PR #105 – OSint: added the possibility of using a DB other than Shodan
- The Status Report now remembers the sorting column and order
- Created a requirements_extras.txt file to handle optional packages for specific features
We hope you enjoy it, and let us know if you have any questions or comments.
Interactive cli tool for HTTP inspection Wuzz command line arguments are similar to cURL’s arguments, so it can be used to inspect/modify requests copied from the browser’s network inspector with the “copy as cURL” feature. Installation and us…
Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to…
The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.USAGEEASYSCANNING FOR WIFI NETWORKSpyt…
A tool to exploit the hash length extension attack in various hashing algorithms.Currently supported algorithms: MD5, SHA1, SHA256, SHA512.Help Menu$ hashpump -hHashPump [-h help] [-t test] [-s signature] [-d data] [-a additional] [-k keylength] Has…
Server-side brute-force module. Brute-force (dictionary attack, jk) attack that supports multiple protocols and services. 1. Introduction brut3k1t is a server-side bruteforce module that supports dictionary attacks for several prot…