OWASP Passfault evaluates passwords and enforces password policy in a completely different way. Running the Command-line Interface Step 1: install javaStep 2:...
Chisel is a fast TCP tunnel, transported over HTTP. Single executable including both client and server. Written in Go (Golang). Chisel is...
It can perform a lockdown. Unlike some other scripts it has the capability to backout changes. Files are backed up using cpio...
rePy2exe, a Reverse Engineering Tool for py2exe applications. cmake git python 2.7 Enter the following command to download rePy2exe file git...
This is a framework based on fingerprint action, this tool is used for get information on website or enterprise target pip...
A tool to kick devices out of your network and enjoy all the bandwidth for yourself. It allows you to select specific...
Short Bytes: A hacker has published an open source tool for helping administrators strengthen the security of their networks. Dubbed TruffleHog, this tool...
Hakku Framework is been made for penetration testing. It offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is...
Wifijammer, is a tool that blocks all wifi clients and access points within range. The effectiveness of this script is constrained by your...
Steghide, is a tool that executes a brute force attack to file with hide information and password established. Linux operating system Steghide Python...
Commix, other wise known as [ comm ]and [ i ]njection e[ x ]ploiter is an automated tool written by that can...
Lobotomy is a command line based Android reverse engineering tool. Components: Permission Strings Attack Surface Surgical Interact UI De-compile De-buggable Dextra...
Raptor WAF is a simple web application firewall made in C, using KISS principle, to make poll use select() function, is not...
Hijacker is a Graphical User Interface for the wireless auditing tools airodump-ng, aireplay-ng and mdk3. It offers a simple and easy UI...
A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to...
Morpheus is a framework tool which automates TCP/UDP packet manipulation tasks by using etter filters to manipulate target requests/responses under MitM attacks...
Wifiphisher is a security tool that mounts automated victim-customized phishing attacks against WiFi clients in order to obtain credentials or infect the...
PyJFuzz is a small, extensible and ready-to-use framework used to fuzz JSON inputs , such as mobile endpoint REST API, JSON implementation,...
FileBuster, a free tool to fuzz a website faster & flexible based on a dictionary using regex patterns. FileBuster was built based...
dedsploit is an open source software use for attacking network protocols and network exploitation. This framework aims to exploit and attack some common...
The VM comes with various open source tools that have been glued together. The two main components are: PhishingFrenzy (https://github.com/pentestgeek/phishing-frenzy) BeEF (https://github.com/beefproject/beef)...