Browsing category

Hack Tools

Predator: Anti-Automation System

Predator – Anti-Automation System Predator is a prototype web application designed to demonstrate anti-crawling, anti-automation & bot detection techniques. It can be used as a honeypot, anti-crawling system or a false-positive testbed for vulnerability scanners. Warning: I strongly discourage the use of the demonstrated methods in a production server without knowing what they exactly do. Remember, […]

Ultimate Facebook Scraper – A Bot Which Scrapes Almost Everything About A Facebook User’S Profile Including All Public Posts/Statuses Available On The User’S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos

Tooling that automates your social media interactions to collect posts, photos, videos, friends, followers and much more on Facebook. FeaturesA bot which scrapes almost everything about a facebook user’s profile including uploaded photos tagged photos videos friends list and their profile photos (including Followers, Following, Work Friends, College Friends etc) and all public posts/statuses available […]

Consumer VPN Safety Tips To Consider

Given that we are almost always connected to the Internet on a daily basis, cybersecurity is a growing concern among all of us. From our IoT devices to our smartphones, we depend on the internet to power our thirst for better communication and information on demand. Today, we explore how a VPN is safe to […]

WhatsDump: Extract WhatsApp private key from any non-rooted Android device

WhatsDump Extract WhatsApp private key from any Android device (Android 7+ supported). This tool spawns a clean Android 6 emulator and attempts to register with your number to extract msgstore private key. NOTE: This tool is in beta stage and might not be stable. You’re more than welcome to improve this software by submitting a […]

PR-DNSd: Passive-Recursive DNS daemon

PR-DNSd Passive-Recursive DNS daemon. What does it do?   Use cases run as localhost DNS service, to fix your netstat/tcpview/lsof, etc. output as enterprise-internal DNS server, to also be able to do meaningful EDR/IR… The post PR-DNSd: Passive-Recursive DNS daemon appeared first on Penetration Testing.

Ddoor – Cross Platform Backdoor Using Dns Txt Records

Cross-platform backdoor using dns txt records. What is ddor?ddor is a cross platform light weight backdoor that uses txt records to execute commands on infected machines.Features Allows a single txt record to have seperate commands for both linux and windows machines List of around 10 public DNS servers that it randomly chooses from Unpredictable call […]

PivotSuite: A Network Pivoting Toolkit

PivotSuite PivotSuite: Hack The Hidden Network – A Network Pivoting Toolkit It is a portable, platform-independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to… The post PivotSuite: A Network Pivoting Toolkit appeared first on Penetration Testing.

WinPwn – Automation For Internal Windows Penetrationtest / AD-Security

In many past internal penetration tests I often had problems with the existing Powershell Recon / Exploitation scripts due to missing proxy support. I often ran the same scripts one after the other to get information about the current system and/or the domain. To automate as many internal penetrationtest processes (reconnaissance as well as exploitation) […]

maltrail v0.16.69 releases: Malicious traffic detection system

Maltrail is a malicious traffic detection system, utilizing publicly available (black)lists containing malicious and/or generally suspicious trails, along with static trails compiled from various AV reports and custom user-defined lists, where trail can be anything… The post maltrail v0.16.69 releases: Malicious traffic detection system appeared first on Penetration Testing.

SQL Injection Payload List

SQL InjectionIn this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL injection vulnerabilities, and summarize how to prevent SQL injection. What is SQL injection (SQLi)?SQL injection is a web security vulnerability that allows an attacker to interfere with the queries that an […]

What Is Meant By Anti Theft Devices

According to the Insurance Bureau of Canada, car theft is a major problem that is occurring all across the world and costs about a billion dollars each year to an individual state. As a… The post What Is Meant By Anti Theft Devices appeared first on Penetration Testing.

Andor – Blind SQL Injection Tool With Golang

Blind SQL Injection Tool with Golang.UsageDownload andor.go and go to the folder where the file andor.go located. And type this to command promt:go run andor.go –url “http://deneme.com/index.php?id=1″** Note: Get parameter value must be correct, otherwise it will not work. Download Andor

seeker v1.1.9 releases: Find GeoLocation with High Accuracy

Seeker Introduction Seeker utilizes HTML5, Javascript, JQuery and PHP to grab Device Information and GeoLocation with High Accuracy. Seeker Hosts a fake website on Apache Server and uses Ngrok to generate an SSL link which asks for Location Permission and if the user allows… The post seeker v1.1.9 releases: Find GeoLocation with High Accuracy appeared first on Penetration Testing.

DetectionLab – Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices

DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing. PurposeThis lab has been designed with defenders in mind. Its primary purpose is to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system […]

Scavenger: searching for credential leaks on different paste sites

Scavenger Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys WordPress configuration files MySQL connect strings onion links links to files… The post Scavenger: searching for credential leaks on different paste sites appeared first on Penetration Testing.