▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 4 :
pinterest.com/UndercOdeOfficial
cewl 4.3 A custom word list generator http://www.digininja.org/projects/cewl.php
cflow 1.4 A C program flow analyzer. http://www.gnu.org/software/cflow/
chaosmap 1.3 An information gathering tool and dns / whois / web server scanner http://freecode.com/projects/chaosmap
chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. http://chaosreader.sourceforge.net/
chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes. https://github.com/moxie0/chapcrack
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker. http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN). http://kernel.embedromix.ro/us/
checksec 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used. http://www.trapkit.de/tools/checksec.html
chiron 0.7 An all-in-one IPv6 Penetration Testing Framework. http://www.secfu.net/tools-scripts/
chkrootkit 0.50 Checks for rootkits on a system http://www.chkrootkit.org/
chntpw 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file http://pogostick.net/~pnh/ntpasswd/
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other http://samy.pl/chownat/
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords. http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html
chromefreak 22.336e323 A Cross-Platform Forensic Framework for Google Chrome http://osandamalith.github.io/ChromeFreak/
cidr2range 0.9 Script for listing the IP addresses contained in a CIDR netblock http://www.cpan.org/authors/id/R/RA/RAYNERLUC
ntruder 0.2.0 An automatic pentesting tool to bypass captchas. http://cintruder.sourceforge.net/
ciphertest 14.7f49ea7 A better SSL cipher checker using gnutls. https://github.com/OpenSecurityResearch/ciphertest
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. http://www.cirt.dk/
cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. http://www.scrypt.net
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. http://www.blackangels.it
cisco-ocs 0.2 Cisco Router Default Password Scanner. http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner
cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool. http://www.arhont.com
cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords. https://github.com/madrisan/cisco7crack
cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords. https://github.com/madrisan/cisco7crack
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
climber 23.f614304 Check UNIX/Linux systems for privilege escalation. https://github.com/raffaele-forte/climber
clusterd 129.0f04a49 Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. https://github.com/hatRiot/clusterd
cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running http://code.google.com/p/cms-explorer
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 4 :
pinterest.com/UndercOdeOfficial
cewl 4.3 A custom word list generator http://www.digininja.org/projects/cewl.php
cflow 1.4 A C program flow analyzer. http://www.gnu.org/software/cflow/
chaosmap 1.3 An information gathering tool and dns / whois / web server scanner http://freecode.com/projects/chaosmap
chaosreader 0.94 A freeware tool to trace tcp, udp etc. sessions and fetch application data from snoop or tcpdump logs. http://chaosreader.sourceforge.net/
chapcrack 17.ae2827f A tool for parsing and decrypting MS-CHAPv2 network handshakes. https://github.com/moxie0/chapcrack
check-weak-dh-ssh 0.1 Debian OpenSSL weak client Diffie-Hellman Exchange checker. http://packetstormsecurity.com/files/66683/check_weak_dh_ssh.pl.bz2.html
checkiban 0.2 Checks the validity of an International Bank Account Number (IBAN). http://kernel.embedromix.ro/us/
checksec 1.5 The checksec.sh script is designed to test what standard Linux OS and PaX security features are being used. http://www.trapkit.de/tools/checksec.html
chiron 0.7 An all-in-one IPv6 Penetration Testing Framework. http://www.secfu.net/tools-scripts/
chkrootkit 0.50 Checks for rootkits on a system http://www.chkrootkit.org/
chntpw 140201 Offline NT Password Editor - reset passwords in a Windows NT SAM user database file http://pogostick.net/~pnh/ntpasswd/
chownat 0.08b Allows two peers behind two separate NATs with no port forwarding and no DMZ setup on their routers to directly communicate with each other http://samy.pl/chownat/
chrome-decode 0.1 Chrome web browser decoder tool that demonstrates recovering passwords. http://packetstormsecurity.com/files/119153/Chrome-Web-Browser-Decoder.html
chromefreak 22.336e323 A Cross-Platform Forensic Framework for Google Chrome http://osandamalith.github.io/ChromeFreak/
cidr2range 0.9 Script for listing the IP addresses contained in a CIDR netblock http://www.cpan.org/authors/id/R/RA/RAYNERLUC
ntruder 0.2.0 An automatic pentesting tool to bypass captchas. http://cintruder.sourceforge.net/
ciphertest 14.7f49ea7 A better SSL cipher checker using gnutls. https://github.com/OpenSecurityResearch/ciphertest
cirt-fuzzer 1.0 A simple TCP/UDP protocol fuzzer. http://www.cirt.dk/
cisco-auditing-tool 1 Perl script which scans cisco routers for common vulnerabilities. Checks for default passwords, easily guessable community names, and the IOS history bug. Includes support for plugins and scanning multiple hosts. http://www.scrypt.net
cisco-global-exploiter 1.3 A perl script that targets multiple vulnerabilities in the Cisco Internetwork Operating System (IOS) and Catalyst products. http://www.blackangels.it
cisco-ocs 0.2 Cisco Router Default Password Scanner. http://www.question-defense.com/2013/01/11/ocs-version-2-release-ocs-cisco-router-default-password-scanner
cisco-router-config 1.1 copy-router-config and merge-router-config to copy and merge Cisco Routers Configuration
cisco-scanner 0.2 Multithreaded Cisco HTTP vulnerability scanner. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
cisco-torch 0.4b Cisco Torch mass scanning, fingerprinting, and exploitation tool. http://www.arhont.com
cisco5crack 2.c4b228c Crypt and decrypt the cisco enable 5 passwords. https://github.com/madrisan/cisco7crack
cisco7crack 2.f1c21dd Crypt and decrypt the cisco enable 7 passwords. https://github.com/madrisan/cisco7crack
ciscos 1.3 Scans class A, B, and C networks for cisco routers which have telnet open and have not changed the default password from cisco.
climber 23.f614304 Check UNIX/Linux systems for privilege escalation. https://github.com/raffaele-forte/climber
clusterd 129.0f04a49 Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack. https://github.com/hatRiot/clusterd
cms-explorer 1.0 Designed to reveal the specific modules, plugins, components and themes that various cms driven websites are running http://code.google.com/p/cms-explorer
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 5 :
pinterest.com/UndercOdeOfficial
cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. http://packetstormsecurity.com/files/64722/cms_few.py.txt.html
codetective 37.f94d9e8 A tool to determine the crypto/encoding algorithm used according to traces of its representation. https://www.digitalloft.org/init/plugin_wiki/page/codetective
complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever http://complemento.sourceforge.net
conpot 0.3.1 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org"
conscan 1.1 A blackbox vulnerability scanner for the Concre5 CMS. http://nullsecurity.net/tools/scanner.html
cookie-cadger 1.07 An auditing tool for Wi-Fi or wired Ethernet connections. https://cookiecadger.com/
cowpatty 4.6 Wireless WPA/WPA2 PSK handshake cracking utility http://www.wirelessdefence.org/Contents/Files/
cpfinder 0.1 This is a simple script that looks for administrative web interfaces. http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html
cppcheck 1.67 A tool for static C/C++ code analysis http://cppcheck.wiki.sourceforge.net/
cpptest 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. http://cpptest.sourceforge.net/
crackhor 2.ae7d83f A Password cracking utility. https://github.com/CoalfireLabs/crackHOR
crackle 39.3e93196 Crack and decrypt BLE encryption https://github.com/mikeryan/crackle/
crackserver 31.c268a80 An XMLRPC server for password cracking. https://github.com/averagesecurityguy/crack
create-ap 112.1c89b44 This script creates a NATed or Bridged WiFi Access Point. https://github.com/oblique/create_ap
creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives. https://code.google.com/p/creddump/
creds 8340.db8ef4a Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. https://github.com/DanMcInerney/creds.py
creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. http://github.com/ilektrojohn/creepy.git
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set. http://sourceforge.net/projects/crunch-wordlist/
cryptcat 1.2.1 A lightweight version of netcat with integrated transport encryption capabilities. http://sourceforge.net/projects/cryptcat
crypthook 17.0728cd1 TCP/UDP symmetric encryption tunnel wrapper. https://github.com/chokepoint/CryptHook
cryptonark 0.4.9 SSL security checker. http://blog.techstacks.com/cryptonark.html
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project
ctunnel 0.6 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel. http://nardcore.org/ctunnel
cuckoo 1.1.1 A malware analysis system. http://cuckoosandbox.org/
cupp 3.0 Common User Password Profiler http://www.remote-exploit.org/?page_id=418
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page. http://cutycapt.sourceforge.net/
cvechecker 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. http://cvechecker.sourceforge.net/
d4n155 1.50 Security audit tool for smart and dynamic wordlist using Google hacking attack and some calculations, after analysis is generated a graphical report. https://github.com/adasecurity/D4N155
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 5 :
pinterest.com/UndercOdeOfficial
cms-few 0.1 Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection vulnerability scanning tool written in Python. http://packetstormsecurity.com/files/64722/cms_few.py.txt.html
codetective 37.f94d9e8 A tool to determine the crypto/encoding algorithm used according to traces of its representation. https://www.digitalloft.org/init/plugin_wiki/page/codetective
complemento 0.7.6 A collection of tools for pentester: LetDown is a powerful tcp flooder ReverseRaider is a domain scanner that use wordlist scanning or reverse resolution scanning Httsquash is an http server scanner, banner grabber and data retriever http://complemento.sourceforge.net
conpot 0.3.1 ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems url="http://conpot.org"
conscan 1.1 A blackbox vulnerability scanner for the Concre5 CMS. http://nullsecurity.net/tools/scanner.html
cookie-cadger 1.07 An auditing tool for Wi-Fi or wired Ethernet connections. https://cookiecadger.com/
cowpatty 4.6 Wireless WPA/WPA2 PSK handshake cracking utility http://www.wirelessdefence.org/Contents/Files/
cpfinder 0.1 This is a simple script that looks for administrative web interfaces. http://packetstormsecurity.com/files/118851/Control-Panel-Finder-Script.html
cppcheck 1.67 A tool for static C/C++ code analysis http://cppcheck.wiki.sourceforge.net/
cpptest 1.1.2 A portable and powerful, yet simple, unit testing framework for handling automated tests in C++. http://cpptest.sourceforge.net/
crackhor 2.ae7d83f A Password cracking utility. https://github.com/CoalfireLabs/crackHOR
crackle 39.3e93196 Crack and decrypt BLE encryption https://github.com/mikeryan/crackle/
crackserver 31.c268a80 An XMLRPC server for password cracking. https://github.com/averagesecurityguy/crack
create-ap 112.1c89b44 This script creates a NATed or Bridged WiFi Access Point. https://github.com/oblique/create_ap
creddump 0.3 A python tool to extract various credentials and secrets from Windows registry hives. https://code.google.com/p/creddump/
creds 8340.db8ef4a Harvest FTP/POP/IMAP/HTTP/IRC credentials along with interesting data from each of the protocols. https://github.com/DanMcInerney/creds.py
creepy 137.9f60449 A geolocation information gatherer. Offers geolocation information gathering through social networking platforms. http://github.com/ilektrojohn/creepy.git
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set. http://sourceforge.net/projects/crunch-wordlist/
cryptcat 1.2.1 A lightweight version of netcat with integrated transport encryption capabilities. http://sourceforge.net/projects/cryptcat
crypthook 17.0728cd1 TCP/UDP symmetric encryption tunnel wrapper. https://github.com/chokepoint/CryptHook
cryptonark 0.4.9 SSL security checker. http://blog.techstacks.com/cryptonark.html
csrftester 1.0 The OWASP CSRFTester Project attempts to give developers the ability to test their applications for CSRF flaws. http://www.owasp.org/index.php/Category:OWASP_CSRFTester_Project
ctunnel 0.6 Tunnel and/or proxy TCP or UDP connections via a cryptographic tunnel. http://nardcore.org/ctunnel
cuckoo 1.1.1 A malware analysis system. http://cuckoosandbox.org/
cupp 3.0 Common User Password Profiler http://www.remote-exploit.org/?page_id=418
cutycapt 10 A Qt and WebKit based command-line utility that captures WebKit's rendering of a web page. http://cutycapt.sourceforge.net/
cvechecker 3.5 The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database. http://cvechecker.sourceforge.net/
d4n155 1.50 Security audit tool for smart and dynamic wordlist using Google hacking attack and some calculations, after analysis is generated a graphical report. https://github.com/adasecurity/D4N155
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 6 :
instagram.com/UndercOdeTestingCompany
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors. http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html
darkjumper 5.8 This tool will try to find every website that host at the same server at your target http://sourceforge.net/projects/darkjumper/
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool https://github.com/BlackArch/darkmysqli
darkstat 3.0.718 Network statistics gatherer (packet sniffer) http://dmr.ath.cx/net/darkstat/
davoset 1.2.3 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. http://websecurity.com.ua/davoset/
davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target http://code.google.com/p/davtest/
dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. https://github.com/gitdurandal/dbd
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines http://www.cqure.net/wp/dbpwaudit/
dc3dd 7.1.614 A patched version of dd that includes a number of features useful for computer forensics http://sourceforge.net/projects/dc3dd
dcfldd 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing http://dcfldd.sourceforge.net/
ddrescue 1.19 GNU data recovery tool http://www.gnu.org/software/ddrescue/ddrescue.html
decker 0.0.11 A penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer. https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/
depant 0.3a Check network for services with default passwords. http://midnightresearch.com/projects/depant/
device-pharmer 35.c1d449e Opens 1K+ IPs or Shodan search results and attempts to login. https://github.com/DanMcInerney/device-pharmer
dex2jar 0.0.9.13 A tool for converting Android's .dex format to Java's .class format http://code.google.com/p/dex2jar
dff-scanner 1.1 Tool for finding path of predictable resource locations. http://netsec.rs/70/tools.html
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow. Stable version http://www.netpatch.ru/dhcdrop.html
dhcpig 69.cc4109a Enumerates hosts, subdomains, and emails from a given domain using google https://github.com/kamorin/DHCPig
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC http://kernel.embedromix.ro/us/
dirb 2.04 A web content scanner, brute forceing for hidden files http://dirb.sourceforge.net/
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
directorytraversalscan 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications. http://sourceforge.net/projects/httpdirscan/
dirs3arch 119.6a3b68a HTTP(S) directory/file brute forcer. https://github.com/maurosoria/dirs3arch
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more. http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html
dislocker 0.3 A tool to exploit the hash length extension attack in various
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 6 :
instagram.com/UndercOdeTestingCompany
darkbing 0.1 A tool written in python that leverages bing for mining data on systems that may be susceptible to SQL injection. http://packetstormsecurity.com/files/111510/darkBing-SQL-Scanner.1.html
darkd0rk3r 1.0 Python script that performs dork searching and searches for local file inclusion and SQL injection errors. http://packetstormsecurity.com/files/117403/Dark-D0rk3r.0.html
darkjumper 5.8 This tool will try to find every website that host at the same server at your target http://sourceforge.net/projects/darkjumper/
darkmysqli 1.6 Multi-Purpose MySQL Injection Tool https://github.com/BlackArch/darkmysqli
darkstat 3.0.718 Network statistics gatherer (packet sniffer) http://dmr.ath.cx/net/darkstat/
davoset 1.2.3 A tool for using Abuse of Functionality and XML External Entities vulnerabilities on some websites to attack other websites. http://websecurity.com.ua/davoset/
davtest 1.0 Tests WebDAV enabled servers by uploading test executable files, and then (optionally) uploading files which allow for command execution or other actions directly on the target http://code.google.com/p/davtest/
dbd 1.50 A Netcat-clone, designed to be portable and offer strong encryption. It runs on Unix-like operating systems and on Microsoft Win32. https://github.com/gitdurandal/dbd
dbpwaudit 0.8 A Java tool that allows you to perform online audits of password quality for several database engines http://www.cqure.net/wp/dbpwaudit/
dc3dd 7.1.614 A patched version of dd that includes a number of features useful for computer forensics http://sourceforge.net/projects/dc3dd
dcfldd 1.3.4.1 DCFL (DoD Computer Forensics Lab) dd replacement with hashing http://dcfldd.sourceforge.net/
ddrescue 1.19 GNU data recovery tool http://www.gnu.org/software/ddrescue/ddrescue.html
decker 0.0.11 A penetration testing orchestration and automation framework, which allows writing declarative, reusable configurations capable of ingesting variables and using outputs of tools it has run as inputs to others.
delldrac 0.1a DellDRAC and Dell Chassis Discovery and Brute Forcer. https://www.trustedsec.com/september/owning-dell-drac-awesome-hack/
depant 0.3a Check network for services with default passwords. http://midnightresearch.com/projects/depant/
device-pharmer 35.c1d449e Opens 1K+ IPs or Shodan search results and attempts to login. https://github.com/DanMcInerney/device-pharmer
dex2jar 0.0.9.13 A tool for converting Android's .dex format to Java's .class format http://code.google.com/p/dex2jar
dff-scanner 1.1 Tool for finding path of predictable resource locations. http://netsec.rs/70/tools.html
dhcdrop 0.5 Remove illegal dhcp servers with IP-pool underflow. Stable version http://www.netpatch.ru/dhcdrop.html
dhcpig 69.cc4109a Enumerates hosts, subdomains, and emails from a given domain using google https://github.com/kamorin/DHCPig
dinouml 0.9.5 A network simulation tool, based on UML (User Mode Linux) that can simulate big Linux networks on a single PC http://kernel.embedromix.ro/us/
dirb 2.04 A web content scanner, brute forceing for hidden files http://dirb.sourceforge.net/
dirbuster 1.0_RC1 An application designed to brute force directories and files names on web/application servers http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project
directorytraversalscan 1.0.1.0 Detect directory traversal vulnerabilities in HTTP servers and web applications. http://sourceforge.net/projects/httpdirscan/
dirs3arch 119.6a3b68a HTTP(S) directory/file brute forcer. https://github.com/maurosoria/dirs3arch
dirscanner 0.1 This is a python script that scans webservers looking for administrative directories, php shells, and more. http://packetstormsecurity.com/files/117773/Directory-Scanner-Tool.html
dislocker 0.3 A tool to exploit the hash length extension attack in various
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Packetstormsecurity
darkBing SQL Scanner 0.1 ≈ Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 7 :
pinterest.com/UndercOdeOfficial
dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
dizzy 0.8.2 A Python based fuzzing framework with many features. http://www.c0decafe.de/
dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more. http://www.mor-pah.net/
dnmap 0.6 The distributed nmap framework http://sourceforge.net/projects/dnmap/
dns-spoof 12.3918a10 Yet another DNS spoof utility. https://github.com/maurotfilho/dns-spoof
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains. http://packetstormsecurity.com/files/118036/DNS-GeoIP.html
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
dnsa 0.5 DNSA is a dns security swiss army knife http://packetfactory.openwall.net/projects/dnsa/index.html
dnsbf 0.2 search for available domain names in an IP range http://code.google.com/p/dnsbf
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. https://github.com/d4rkcat/dnsbrute
dnschef 0.3 A highly configurable DNS proxy for pentesters. http://thesprawl.org/projects/dnschef/
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS http://nullsecurity.net/tools/dos.html
dnsenum 1.2.4.1 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum
dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies http://nullsecurity.net/tools/scanner.html
DNStable Passive DNS network mapper https://dnstable.com/
dnspredict 0.0.2 DNS prediction http://johnny.ihackstuff.com
dnsrecon 0.8.8 Python script for enumeration of hosts, subdomains and emails from a given domain using google. https://github.com/darkoperator/dnsrecon
dnsspider 0.5 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. http://nullsecurity.net/tools/scanner.html
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers http://www.mavetju.org/unix/dnstracer.php
dnsutils 9.9.2.P2 DNS utilities: dig host nslookup http://www.isc.org/software/bind/
dnswalk 2.0.2 A DNS debugger http://sourceforge.net/projects/dnswalk/
domain-analyzer 0.8.1 Finds all the security information for a given domain name. http://sourceforge.net/projects/domainanalyzer/
doona 118.ff1e17b A fork of the Bruteforce Exploit Detector Tool (BED). https://github.com/wireghoul/doona
dotdotpwn 3.0 The Transversal Directory Fuzzer http://dotdotpwn.blogspot.com
dpeparser beta002 Default password enumeration project http://www.toolswatch.org/dpe/
dpscan 0.1 Drupal Vulnerabilty Scanner. https://github.com/insaneisnotfree/Blue-Sky-Information-Security
dradis 2.9.0 An open source framework to enable effective information sharing. http://dradisframework.org/
driftnet 0.1.6 Listens to network traffic and picks out images from TCP streams it observes. http://www.ex-parrot.com/~chris/driftnet/
_dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. http://www.blackhatlibrary.net/Dripper
dscanner 709.f00026f Swiss-army knife for D source code. https://github.com/Hackerpilot/Dscanner
dsd 84.60807e0 Digital Speech Decoder https://github.com/szechyjs/dsd
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS. https://github.com/0verl0ad/Dumb0
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 7 :
pinterest.com/UndercOdeOfficial
dissector 1 This code dissects the internal data structures in ELF files. It supports x86 and x86_64 archs and runs under Linux. http://packetstormsecurity.com/files/125972/Coloured-ELF-File-Dissector.html
dizzy 0.8.2 A Python based fuzzing framework with many features. http://www.c0decafe.de/
dmitry 1.3a Deepmagic Information Gathering Tool. Gathers information about hosts. It is able to gather possible subdomains, email addresses, and uptime information and run tcp port scans, whois lookups, and more. http://www.mor-pah.net/
dnmap 0.6 The distributed nmap framework http://sourceforge.net/projects/dnmap/
dns-spoof 12.3918a10 Yet another DNS spoof utility. https://github.com/maurotfilho/dns-spoof
dns2geoip 0.1 A simple python script that brute forces DNS and subsequently geolocates the found subdomains. http://packetstormsecurity.com/files/118036/DNS-GeoIP.html
dns2tcp 0.5.2 A tool for relaying TCP connections over DNS. http://www.hsc.fr/ressources/outils/dns2tcp/index.html.en
dnsa 0.5 DNSA is a dns security swiss army knife http://packetfactory.openwall.net/projects/dnsa/index.html
dnsbf 0.2 search for available domain names in an IP range http://code.google.com/p/dnsbf
dnsbrute 2.b1dc84a Multi-theaded DNS bruteforcing, average speed 80 lookups/second with 40 threads. https://github.com/d4rkcat/dnsbrute
dnschef 0.3 A highly configurable DNS proxy for pentesters. http://thesprawl.org/projects/dnschef/
dnsdrdos 0.1 Proof of concept code for distributed DNS reflection DoS http://nullsecurity.net/tools/dos.html
dnsenum 1.2.4.1 Script that enumerates DNS information from a domain, attempts zone transfers, performs a brute force dictionary style attack, and then performs reverse look-ups on the results. http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=dnsenum
dnsgoblin 0.1 Nasty creature constantly searching for DNS servers. It uses standard dns querys and waits for the replies http://nullsecurity.net/tools/scanner.html
DNStable Passive DNS network mapper https://dnstable.com/
dnspredict 0.0.2 DNS prediction http://johnny.ihackstuff.com
dnsrecon 0.8.8 Python script for enumeration of hosts, subdomains and emails from a given domain using google. https://github.com/darkoperator/dnsrecon
dnsspider 0.5 A very fast multithreaded bruteforcer of subdomains that leverages a wordlist and/or character permutation. http://nullsecurity.net/tools/scanner.html
dnstracer 1.9 Determines where a given DNS server gets its information from, and follows the chain of DNS servers http://www.mavetju.org/unix/dnstracer.php
dnsutils 9.9.2.P2 DNS utilities: dig host nslookup http://www.isc.org/software/bind/
dnswalk 2.0.2 A DNS debugger http://sourceforge.net/projects/dnswalk/
domain-analyzer 0.8.1 Finds all the security information for a given domain name. http://sourceforge.net/projects/domainanalyzer/
doona 118.ff1e17b A fork of the Bruteforce Exploit Detector Tool (BED). https://github.com/wireghoul/doona
dotdotpwn 3.0 The Transversal Directory Fuzzer http://dotdotpwn.blogspot.com
dpeparser beta002 Default password enumeration project http://www.toolswatch.org/dpe/
dpscan 0.1 Drupal Vulnerabilty Scanner. https://github.com/insaneisnotfree/Blue-Sky-Information-Security
dradis 2.9.0 An open source framework to enable effective information sharing. http://dradisframework.org/
driftnet 0.1.6 Listens to network traffic and picks out images from TCP streams it observes. http://www.ex-parrot.com/~chris/driftnet/
_dripper v1.r1.gc9bb0c9 A fast, asynchronous DNS scanner; it can be used for enumerating subdomains and enumerating boxes via reverse DNS. http://www.blackhatlibrary.net/Dripper
dscanner 709.f00026f Swiss-army knife for D source code. https://github.com/Hackerpilot/Dscanner
dsd 84.60807e0 Digital Speech Decoder https://github.com/szechyjs/dsd
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS. https://github.com/0verl0ad/Dumb0
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 8:
pinterest.com/UndercOdeOfficial
dump1090 386.bff92c4 A simple Mode S decoder for RTLSDR devices. https://github.com/MalcolmRobb/dump1090
dumpacl 0.0 Dumps NTs ACLs and audit settings. http://www.systemtools.com/cgi-bin/download.pl?DumpAcl
dumpzilla 03152013 A forensic tool for firefox. http://www.dumpzilla.org/
eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol http://www.willhackforsushi.com/?page_id=67
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials. https://github.com/brav0hax/easy-creds
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant). http://www.mh-sec.de/downloads.html.en
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html
edb 0.9.20 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg. http://www.codef00.com/projects.php#Debugger
eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes) http://www.jonesdykstra.com/
elettra 1.0 Encryption utility by Julia Identity http://www.winstonsmith.info/julia/elettra/
elettra-gui 1.0 Gui for the elettra crypto application. http://www.winstonsmith.info/julia/elettra/
elite-proxy-finder 42.b92f75a Finds public elite anonymity proxies and concurrently tests them. https://github.com/DanMcInerney/elite-proxy-finder
enabler 1 attempts to find the enable password on a cisco system via brute force. http://packetstormsecurity.org/cisco/enabler.c
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html
ent 1.0 Pseudorandom number sequence test. http://www.fourmilab.ch/random
enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account. https://github.com/dejanlevaja/enum_shares
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems. http://labs.portcullis.co.uk/application/enum4linux/
enumiax 1.0 IAX enumerator http://sourceforge.net/projects/enumiax/
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6. http://www.enye-sec.org/programas.html
epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. http://sourceforge.net/projects/epicwebhoneypot/
erase-registrations 1.0 IAX flooder http://www.hackingexposedvoip.com/
etherape 0.9.13 A graphical network monitor for various OSI layers and protocols http://etherape.sourceforge.net/
ettercap 0.8.1 A network sniffer/interceptor/logger for ethernet LANs - console http://ettercap.github.com/ettercap/
evilgrade 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates http://www.infobyte.com.ar/developments.html
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password http://theinvisiblethings.blogspot.com
exiv2 0.24 Exif and Iptc metadata manipulation library and tools http://exiv2.org
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks http://www.exploit-db.com
extracthosts 14.ec8b89c Extracts hosts (IP/Hostnames) from files. https://github.com/bwall/ExtractHosts
eyewitness 278.e72c21e Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 8:
pinterest.com/UndercOdeOfficial
dump1090 386.bff92c4 A simple Mode S decoder for RTLSDR devices. https://github.com/MalcolmRobb/dump1090
dumpacl 0.0 Dumps NTs ACLs and audit settings. http://www.systemtools.com/cgi-bin/download.pl?DumpAcl
dumpzilla 03152013 A forensic tool for firefox. http://www.dumpzilla.org/
eapmd5pass 1.4 An implementation of an offline dictionary attack against the EAP-MD5 protocol http://www.willhackforsushi.com/?page_id=67
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials. https://github.com/brav0hax/easy-creds
easyfuzzer 3.6 A flexible fuzzer, not only for web, has a CSV output for efficient output analysis (platform independant). http://www.mh-sec.de/downloads.html.en
eazy 0.1 This is a small python tool that scans websites to look for PHP shells, backups, admin panels, and more. http://packetstormsecurity.com/files/117572/EAZY-Web-Scanner.html
edb 0.9.20 A QT4-based binary mode debugger with the goal of having usability on par with OllyDbg. http://www.codef00.com/projects.php#Debugger
eindeutig 20050628_1 Examine the contents of Outlook Express DBX email repository files (forensic purposes) http://www.jonesdykstra.com/
elettra 1.0 Encryption utility by Julia Identity http://www.winstonsmith.info/julia/elettra/
elettra-gui 1.0 Gui for the elettra crypto application. http://www.winstonsmith.info/julia/elettra/
elite-proxy-finder 42.b92f75a Finds public elite anonymity proxies and concurrently tests them. https://github.com/DanMcInerney/elite-proxy-finder
enabler 1 attempts to find the enable password on a cisco system via brute force. http://packetstormsecurity.org/cisco/enabler.c
encodeshellcode 0.1b This is an encoding tool for 32-bit x86 shellcode that assists a researcher when dealing with character filter or byte restrictions in a buffer overflow vulnerability or some kind of IDS/IPS/AV blocking your code. http://packetstormsecurity.com/files/119904/Encode-Shellcode.1b.html
ent 1.0 Pseudorandom number sequence test. http://www.fourmilab.ch/random
enum-shares 7.97cba5a Tool that enumerates shared folders across the network and under a custom user account. https://github.com/dejanlevaja/enum_shares
enum4linux 0.8.9 A tool for enumerating information from Windows and Samba systems. http://labs.portcullis.co.uk/application/enum4linux/
enumiax 1.0 IAX enumerator http://sourceforge.net/projects/enumiax/
enyelkm 1.2 Rootkit for Linux x86 kernels v2.6. http://www.enye-sec.org/programas.html
epicwebhoneypot 2.0a Tool which aims to lure attackers using various types of web vulnerability scanners by tricking them into believing that they have found a vulnerability on a host. http://sourceforge.net/projects/epicwebhoneypot/
erase-registrations 1.0 IAX flooder http://www.hackingexposedvoip.com/
etherape 0.9.13 A graphical network monitor for various OSI layers and protocols http://etherape.sourceforge.net/
ettercap 0.8.1 A network sniffer/interceptor/logger for ethernet LANs - console http://ettercap.github.com/ettercap/
evilgrade 2.0.0 Modular framework that takes advantage of poor upgrade implementations by injecting fake updates http://www.infobyte.com.ar/developments.html
evilmaid 1.01 TrueCrypt loader backdoor to sniff volume password http://theinvisiblethings.blogspot.com
exiv2 0.24 Exif and Iptc metadata manipulation library and tools http://exiv2.org
exploit-db 1.6 The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software - A collection of hacks http://www.exploit-db.com
extracthosts 14.ec8b89c Extracts hosts (IP/Hostnames) from files. https://github.com/bwall/ExtractHosts
eyewitness 278.e72c21e Designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. https://github.com/ChrisTruncer/EyeWitness
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 9 :
pinterest.com/UndercOdeOfficial
facebot 23.57f6025 A facebook profile and reconnaissance system. https://github.com/pun1sh3r/facebot
facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). https://github.com/emerinohdz/FaceBrute
fakeap 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. http://www.blackalchemy.to/project/fakeap/
fakedns 17.87d4216 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses. https://github.com/Crypt0s/FakeDns
fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing. http://sourceforge.net/projects/fakemail/
fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. https://github.com/mubix/FakeNetBIOS
fang 1.2 A multi service threaded MD5 cracker. https://github.com/evilsocket/fang
fcrackzip 1.0 Zip file password cracker http://oldhome.schmorp.de/marc/fcrackzip.html
fern-wifi-cracker 219 WEP, WPA wifi cracker for wireless penetration testing http://code.google.com/p/fern-wifi-cracker/
fernmelder 6.c6d4ebe Asynchronous mass DNS scanner. https://github.com/stealth/fernmelder
fgscanner 11.893372c An advanced, opensource URL scanner. http://www.fantaghost.com/fgscanner
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html
fierce 0.9.9 A DNS scanner http://ha.ckers.org/fierce/
fiked 0.0.5 Fake IDE daemon http://www.roe.ch/FakeIKEd
filibuster 161.37b7f9c A Egress filter mapping application with additional functionality. https://github.com/subinacls/Filibuster
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation http://code.google.com/p/fimap/
findmyhash 1.1.2 Crack different types of hashes using free online services http://code.google.com/p/findmyhash/
firewalk 5.0 An active reconnaissance network security tool http://packetfactory.openwall.net/projects/firewalk/
firmware-mod-kit 099 Modify firmware images without recompiling! http://code.google.com/p/firmware-mod-kit
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points. https://github.com/nccgroup/firstexecution
fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. http://lcamtuf.coredump.cx/
flare 0.6 Flare processes an SWF and extracts all scripts from it. http://www.nowrap.de/flare.html
flasm 1.62 Disassembler tool for SWF bytecode http://www.nowrap.de/flasm.html
flawfinder 1.31 Searches through source code for potential security flaws. http://www.dwheeler.com/flawfinder
flowinspect 94.01c8921 A network traffic inspection tool. https://github.com/7h3rAm/flowinspect
flunym0us 2.0 A Vulnerability Scanner for Wordpress and Moodle. http://code.google.com/p/flunym0us/
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures http://foremost.sourceforge.net/
fpdns 0.9.3 Program that remotely determines DNS server versions http://code.google.com/p/fpdns/
fping 3.10 A utility to ping multiple hosts at once http://www.fping.org/
fport 2.0 Identify unknown open ports and their associated applications. http://www.foundstone.com/us/resources/proddesc/fport.htm
fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6. https://github.com/stealth/fraud-bridge
freeipmi 1.4.5 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). http://www.gnu.org/software/freeipmi/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 9 :
pinterest.com/UndercOdeOfficial
facebot 23.57f6025 A facebook profile and reconnaissance system. https://github.com/pun1sh3r/facebot
facebrute 7.ece355b This script tries to guess passwords for a given facebook account using a list of passwords (dictionary). https://github.com/emerinohdz/FaceBrute
fakeap 0.3.2 Black Alchemy's Fake AP generates thousands of counterfeit 802.11b access points. Hide in plain sight amongst Fake AP's cacophony of beacon frames. http://www.blackalchemy.to/project/fakeap/
fakedns 17.87d4216 A regular-expression based python MITM DNS server with correct DNS request passthrough and "Not Found" responses. https://github.com/Crypt0s/FakeDns
fakemail 1.0 Fake mail server that captures e-mails as files for acceptance testing. http://sourceforge.net/projects/fakemail/
fakenetbios 7.b83701e A family of tools designed to simulate Windows hosts (NetBIOS) on a LAN. https://github.com/mubix/FakeNetBIOS
fang 1.2 A multi service threaded MD5 cracker. https://github.com/evilsocket/fang
fcrackzip 1.0 Zip file password cracker http://oldhome.schmorp.de/marc/fcrackzip.html
fern-wifi-cracker 219 WEP, WPA wifi cracker for wireless penetration testing http://code.google.com/p/fern-wifi-cracker/
fernmelder 6.c6d4ebe Asynchronous mass DNS scanner. https://github.com/stealth/fernmelder
fgscanner 11.893372c An advanced, opensource URL scanner. http://www.fantaghost.com/fgscanner
fhttp 1.3 This is a framework for HTTP related attacks. It is written in Perl with a GTK interface, has a proxy for debugging and manipulation, proxy chaining, evasion rules, and more. http://packetstormsecurity.com/files/104315/FHTTP-Attack-Tool.3.html
fierce 0.9.9 A DNS scanner http://ha.ckers.org/fierce/
fiked 0.0.5 Fake IDE daemon http://www.roe.ch/FakeIKEd
filibuster 161.37b7f9c A Egress filter mapping application with additional functionality. https://github.com/subinacls/Filibuster
fimap 1.00 A little tool for local and remote file inclusion auditing and exploitation http://code.google.com/p/fimap/
findmyhash 1.1.2 Crack different types of hashes using free online services http://code.google.com/p/findmyhash/
firewalk 5.0 An active reconnaissance network security tool http://packetfactory.openwall.net/projects/firewalk/
firmware-mod-kit 099 Modify firmware images without recompiling! http://code.google.com/p/firmware-mod-kit
firstexecution 6.a275793 A Collection of different ways to execute code outside of the expected entry points. https://github.com/nccgroup/firstexecution
fl0p 0.1 A passive L7 flow fingerprinter that examines TCP/UDP/ICMP packet sequences, can peek into cryptographic tunnels, can tell human beings and robots apart, and performs a couple of other infosec-related tricks. http://lcamtuf.coredump.cx/
flare 0.6 Flare processes an SWF and extracts all scripts from it. http://www.nowrap.de/flare.html
flasm 1.62 Disassembler tool for SWF bytecode http://www.nowrap.de/flasm.html
flawfinder 1.31 Searches through source code for potential security flaws. http://www.dwheeler.com/flawfinder
flowinspect 94.01c8921 A network traffic inspection tool. https://github.com/7h3rAm/flowinspect
flunym0us 2.0 A Vulnerability Scanner for Wordpress and Moodle. http://code.google.com/p/flunym0us/
foremost 1.5.7 A console program to recover files based on their headers, footers, and internal data structures http://foremost.sourceforge.net/
fpdns 0.9.3 Program that remotely determines DNS server versions http://code.google.com/p/fpdns/
fping 3.10 A utility to ping multiple hosts at once http://www.fping.org/
fport 2.0 Identify unknown open ports and their associated applications. http://www.foundstone.com/us/resources/proddesc/fport.htm
fraud-bridge 10.775c563 ICMP and DNS tunneling via IPv4 and IPv6. https://github.com/stealth/fraud-bridge
freeipmi 1.4.5 Sensor monitoring, system event monitoring, power control, and serial-over-LAN (SOL). http://www.gnu.org/software/freeipmi/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 10 :
pinterest.com/UndercOdeOfficial
fs-nyarl 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. http://www.fulgursecurity.com/en/content/fs-nyarl
fsnoop 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods"). http://vladz.devzero.fr/fsnoop.php
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines. http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. http://www.inversepath.com/ftester.html
ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server sofware http://nullsecurity.net/tools/fuzzer.html
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. http://packetstormsecurity.com/files/35120/ftp-spider.pl.html
fusil 1.4 Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files http://bitbucket.org/haypo/fusil/wiki/Home
fuzzap 14.f13932c A python script for obfuscating wireless networks. https://github.com/lostincynicism/FuzzAP
fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. http://nologin.org/
fuzzdb 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing https://code.google.com/p/fuzzdb/
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. http://vsecurity.com/resources/tool
fuzztalk 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. https://code.google.com/p/fuzztalk
g72x++ 1 Decoder for the g72x++ codec. http://www.ps-auxw.de/
galleta 20040505_1 Examine the contents of the IE's cookie files for forensic purposes http://www.jonesdykstra.com/
gdb 7.8.1 The GNU Debugger http://www.gnu.org/software/gdb/
genlist 0.1 Generates lists of IP addresses.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
geoip 1.6.2 Non-DNS IP-to-country resolver C library & utils http://www.maxmind.com/app/c
geoipgen 0.4 GeoIPgen is a country to IP addresses generator. http://code.google.com/p/geoipgen/
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. http://www.cqure.net/wp/getsids/
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. http://www.morningstarsecurity.com/research/gggooglescan
ghettotooth 1.0 Ghettodriving for bluetooth http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
ghost-phisher 1.62 GUI suite for phishing and penetration attacks http://code.google.com/p/ghost-phisher
ghost-py 0.1b3 Webkit based webclient (relies on PyQT). http://jeanphix.github.com/Ghost.py/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 10 :
pinterest.com/UndercOdeOfficial
fs-nyarl 1.0 A network takeover & forensic analysis tool - useful to advanced PenTest tasks & for fun and profit. http://www.fulgursecurity.com/en/content/fs-nyarl
fsnoop 3.3 A tool to monitor file operations on GNU/Linux systems by using the Inotify mechanism. Its primary purpose is to help detecting file race condition vulnerabilities and since version 3, to exploit them with loadable DSO modules (also called "payload modules" or "paymods"). http://vladz.devzero.fr/fsnoop.php
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines. http://packetstormsecurity.com/files/106450/FStealer-Filesystem-Mirroring-Tool.html
ftester 1.0 A tool designed for testing firewall filtering policies and Intrusion Detection System (IDS) capabilities. http://www.inversepath.com/ftester.html
ftp-fuzz 1337 The master of all master fuzzing scripts specifically targeted towards FTP server sofware http://nullsecurity.net/tools/fuzzer.html
ftp-scanner 0.2.5 Multithreaded ftp scanner/brute forcer. Tested on Linux, OpenBSD and Solaris. http://wayreth.eu.org/old_page/
ftp-spider 1.0 FTP investigation tool - Scans ftp server for the following: reveal entire directory tree structures, detect anonymous access, detect directories with write permissions, find user specified data within repository. http://packetstormsecurity.com/files/35120/ftp-spider.pl.html
fusil 1.4 Fusil the fuzzer is a Python library used to write fuzzing programs. It helps to start process with a prepared environment (limit memory, environment variables, redirect stdout, etc.), start network client or server, and create mangled files http://bitbucket.org/haypo/fusil/wiki/Home
fuzzap 14.f13932c A python script for obfuscating wireless networks. https://github.com/lostincynicism/FuzzAP
fuzzball2 0.7 A little fuzzer for TCP and IP options. It sends a bunch of more or less bogus packets to the host of your choice. http://nologin.org/
fuzzdb 1.09 Attack and Discovery Pattern Database for Application Fuzz Testing https://code.google.com/p/fuzzdb/
fuzzdiff 1.0 A simple tool designed to help out with crash analysis during fuzz testing. It selectively 'un-fuzzes' portions of a fuzzed file that is known to cause a crash, re-launches the targeted application, and sees if it still crashes. http://vsecurity.com/resources/tool
fuzztalk 1.0.0.0 An XML driven fuzz testing framework that emphasizes easy extensibility and reusability. https://code.google.com/p/fuzztalk
g72x++ 1 Decoder for the g72x++ codec. http://www.ps-auxw.de/
galleta 20040505_1 Examine the contents of the IE's cookie files for forensic purposes http://www.jonesdykstra.com/
gdb 7.8.1 The GNU Debugger http://www.gnu.org/software/gdb/
genlist 0.1 Generates lists of IP addresses.
geoedge 0.2 This little tools is designed to get geolocalization information of a host, it get the information from two sources (maxmind and geoiptool).
geoip 1.6.2 Non-DNS IP-to-country resolver C library & utils http://www.maxmind.com/app/c
geoipgen 0.4 GeoIPgen is a country to IP addresses generator. http://code.google.com/p/geoipgen/
getsids 0.0.1 Getsids tries to enumerate Oracle Sids by sending the services command to the Oracle TNS listener. Like doing ‘lsnrctl service’. http://www.cqure.net/wp/getsids/
gggooglescan 0.4 A Google scraper which performs automated searches and returns results of search queries in the form of URLs or hostnames. http://www.morningstarsecurity.com/research/gggooglescan
ghettotooth 1.0 Ghettodriving for bluetooth http://www.oldskoolphreak.com/tfiles/ghettotooth.txt
ghost-phisher 1.62 GUI suite for phishing and penetration attacks http://code.google.com/p/ghost-phisher
ghost-py 0.1b3 Webkit based webclient (relies on PyQT). http://jeanphix.github.com/Ghost.py/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 11 :
pinterest.com/UndercOdeOfficial
gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2) http://gnutls.org/
goldeneye 16.7a38fe9 A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. https://github.com/jseidl/GoldenEye
golismero 2.0 Opensource web security testing framework. https://github.com/golismero/golismero
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. http://goo-dork.blogspot.com/
goofile 1.5 Command line filetype search https://code.google.com/p/goofile/
goog-mail 1.0 Enumerate domain emails from google. http://www.darkc0de.com/others/goog-mail.py
googlesub 1.2 A python script to find domains by using google dorks. https://github.com/zombiesam/googlesub
gqrx 2.3.1 Interactive SDR receiver waterfall for many devices. http://gqrx.dk/
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website. http://rgaucher.info/beta/grabber/
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2 http://www.irongeek.com/downloads/grepforrfi.txt
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files. http://code.google.com/p/grokevt/
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts. http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. http://www.c0decafe.de/
guymager 0.7.4 A forensic imager for media acquisition. http://guymager.sourceforge.net/
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet. http://packetstormsecurity.com/files/62047/gwcheck.c.html
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls. http://www.gdssecurity.com/l/t/d.php?k=GwtEnum
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools http://www.hackersh.org/
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. http://halberd.superadditive.com/
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. http://www.blackhatlibrary.net/Halcyon
hamster 2.0.0 Tool for HTTP session sidejacking. http://hamster.erratasec.com/
handle 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,.. http://www.tarasco.org/security/handle/index.html
hash-identifier 1.1 Identifies the different types of hashes used to encrypt data, especially passwords http://code.google.com/p/hash-identifier
hashcat 0.47 A multithreaded cross platform hash cracker. http://hashcat.net/hashcat/
_hashcat-utils 1.0 Utilites for Hashcat http://hashcat.net/wiki/doku.php?id=hashcat_utils
hasher 32.e9d1394 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. https://github.com/ChrisTruncer/Hasher
hashid 2.6.0 Software to identify the different types of hashes used to encrypt data https://github.com/psypanda/hashID
hashpump 34.0b3c286 A tool to exploit the hash length extension attack in various hashing algorithms. https://github.com/bwall/HashPump
hashtag 0.41 A python script written to parse and identify password hashes. https://github.com/SmeegeSec/HashTag
haystack 1035.ac2ffa4 A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics. https://github.com/trolldbois/python-haystack
hbad 1.0 This tool allows you to test clients on the heartbleed bug. http://www.curesec.com/
hcraft 1.0.0 HTTP Vuln Request Crafter http://sourceforge.net/projects/hcraft/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 11 :
pinterest.com/UndercOdeOfficial
gnutls2 2.12.23 A library which provides a secure layer over a reliable transport layer (Version 2) http://gnutls.org/
goldeneye 16.7a38fe9 A HTTP DoS test tool. Attack Vector exploited: HTTP Keep Alive + NoCache. https://github.com/jseidl/GoldenEye
golismero 2.0 Opensource web security testing framework. https://github.com/golismero/golismero
goodork 2.2 A python script designed to allow you to leverage the power of google dorking straight from the comfort of your command line. http://goo-dork.blogspot.com/
goofile 1.5 Command line filetype search https://code.google.com/p/goofile/
goog-mail 1.0 Enumerate domain emails from google. http://www.darkc0de.com/others/goog-mail.py
googlesub 1.2 A python script to find domains by using google dorks. https://github.com/zombiesam/googlesub
gqrx 2.3.1 Interactive SDR receiver waterfall for many devices. http://gqrx.dk/
grabber 0.1 A web application scanner. Basically it detects some kind of vulnerabilities in your website. http://rgaucher.info/beta/grabber/
grepforrfi 0.1 Simple script for parsing web logs for RFIs and Webshells v1.2 http://www.irongeek.com/downloads/grepforrfi.txt
grokevt 0.5.0 A collection of scripts built for reading Windows® NT/2K/XP/2K eventlog files. http://code.google.com/p/grokevt/
gtalk-decode 0.1 Google Talk decoder tool that demonstrates recovering passwords from accounts. http://packetstormsecurity.com/files/119154/Google-Talk-Decoder.html
gtp-scan 0.7 A small python script that scans for GTP (GPRS tunneling protocol) speaking hosts. http://www.c0decafe.de/
guymager 0.7.4 A forensic imager for media acquisition. http://guymager.sourceforge.net/
gwcheck 0.1 A simple program that checks if a host in an ethernet network is a gateway to Internet. http://packetstormsecurity.com/files/62047/gwcheck.c.html
gwtenum 7.f27a5aa Enumeration of GWT-RCP method calls. http://www.gdssecurity.com/l/t/d.php?k=GwtEnum
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools http://www.hackersh.org/
halberd 0.2.4 Halberd discovers HTTP load balancers. It is useful for web application security auditing and for load balancer configuration testing. http://halberd.superadditive.com/
halcyon 0.1 A repository crawler that runs checksums for static files found within a given git repository. http://www.blackhatlibrary.net/Halcyon
hamster 2.0.0 Tool for HTTP session sidejacking. http://hamster.erratasec.com/
handle 0.0 An small application designed to analyze your system searching for global objects related to running proccess and display information for every found object, like tokens, semaphores, ports, files,.. http://www.tarasco.org/security/handle/index.html
hash-identifier 1.1 Identifies the different types of hashes used to encrypt data, especially passwords http://code.google.com/p/hash-identifier
hashcat 0.47 A multithreaded cross platform hash cracker. http://hashcat.net/hashcat/
_hashcat-utils 1.0 Utilites for Hashcat http://hashcat.net/wiki/doku.php?id=hashcat_utils
hasher 32.e9d1394 A tool that allows you to quickly hash plaintext strings, or compare hashed values with a plaintext locally. https://github.com/ChrisTruncer/Hasher
hashid 2.6.0 Software to identify the different types of hashes used to encrypt data https://github.com/psypanda/hashID
hashpump 34.0b3c286 A tool to exploit the hash length extension attack in various hashing algorithms. https://github.com/bwall/HashPump
hashtag 0.41 A python script written to parse and identify password hashes. https://github.com/SmeegeSec/HashTag
haystack 1035.ac2ffa4 A Python framework for finding C structures from process memory - heap analysis - Memory structures forensics. https://github.com/trolldbois/python-haystack
hbad 1.0 This tool allows you to test clients on the heartbleed bug. http://www.curesec.com/
hcraft 1.0.0 HTTP Vuln Request Crafter http://sourceforge.net/projects/hcraft/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 11 :
t.me/UndercOdeTesting
hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP
crypto keys from HDMI devices. https://github.com/ApertureLabsLtd/hdmi-sniff
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
hex2bin 1.0.7 Converts Motorola and Intel hex files to binary. http://hex2bin.sourceforge.net/
hexinject 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access. http://hexinject.sourceforge.net
hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). https://code.google.com/p/hexorbase/
hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html
hidattack 0.1 HID Attack (attacking HID host implementations) http://mulliner.org/bluetooth/hidattack.php
honeyd 1.6.7 A small daemon that creates virtual hosts on a network. https://github.com/DataSoft/Honeyd/
honssh 47.0de60ec A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. https://code.google.com/p/honssh/
hookanalyser 3.0 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. http://hookanalyser.blogspot.de/
host-extract 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. https://code.google.com/p/host-extract/
hostbox-ssh 0.1.1 A ssh password/account scanner. http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Termux-Linux Tools lastest Part 11 :
t.me/UndercOdeTesting
hdmi-sniff 5.f7fbc0e HDMI DDC (I2C) inspection tool. It is designed to demonstrate just how easy it is to recover HDCP
crypto keys from HDMI devices. https://github.com/ApertureLabsLtd/hdmi-sniff
heartbleed-honeypot 0.1 Script that listens on TCP port 443 and responds with completely bogus SSL heartbeat responses, unless it detects the start of a byte pattern similar to that used in Jared Stafford's http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
hex2bin 1.0.7 Converts Motorola and Intel hex files to binary. http://hex2bin.sourceforge.net/
hexinject 1.5 A very versatile packet injector and sniffer that provides a command-line framework for raw network access. http://hexinject.sourceforge.net
hexorbase 6 A database application designed for administering and auditing multiple database servers simultaneously from a centralized location. It is capable of performing SQL queries and bruteforce attacks against common database servers (MySQL, SQLite, Microsoft SQL Server, Oracle, PostgreSQL). https://code.google.com/p/hexorbase/
hharp 1beta This tool can perform man-in-the-middle and switch flooding attacks. It has 4 major functions, 3 of which attempt to man-in-the-middle one or more computers on a network with a passive method or flood type method. http://packetstormsecurity.com/files/81368/Hackers-Hideaway-ARP-Attack-Tool.html
hidattack 0.1 HID Attack (attacking HID host implementations) http://mulliner.org/bluetooth/hidattack.php
honeyd 1.6.7 A small daemon that creates virtual hosts on a network. https://github.com/DataSoft/Honeyd/
honssh 47.0de60ec A high-interaction Honey Pot solution designed to log all SSH communications between a client and server. https://code.google.com/p/honssh/
hookanalyser 3.0 A hook tool which can be potentially helpful in reversing applications and analyzing malware. It can hook to an API in a process and search for a pattern in memory or dump the buffer. http://hookanalyser.blogspot.de/
host-extract 9 Ruby script tries to extract all IP/Host patterns in page response of a given URL and JavaScript/CSS files of that URL. https://code.google.com/p/host-extract/
hostbox-ssh 0.1.1 A ssh password/account scanner. http://stridsmanit.wordpress.com/2012/12/02/brute-forcing-passwords-with-hostbox-ssh-1-1/
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Rooted termux-linux tool airmon-ng suite (for all your wireless cracking needs)
twitter.com/UndercOdeTC
🦑 Requirements
1) tcpdump
2) libmproxy (packaged with zarp)
3) paramiko (SSH service)
4) nfqueue-bindings (packet modifier)
🦑 The recommended installation process is to run:
1) git clone git://github.com/hatRiot/zarp.git
2) pip install -r requirements.txt
3) You can then run:
4) sudo python zarp.py --update
to update zarp. The update flag will not work if you download the tarball from the Git page.
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
> Scapy comes packaged with Zarp and no installation is required. Wifite is used for wireless AP cracking; a specific version (ballast-dev branch) is required.
> This comes packaged with zarp. There are some dependencies required for Scapy, but most should be pretty easy to install or already be installed.
🦑 Tool Overview
Broad categories are (see wiki for more information on these):
1) Poisoners
2) Denial of Service
3) Sniffers
4) Scanners
5) Services
6) Parameter
7) Attacks
🦑usage: zarp.py [-h] [-q FILTER] [--update] [--wap] [--ftp] [--http] [--smb]
[--ssh] [--telnet] [-w] [-s] [--service-scan]
optional arguments:
-h, --help show this help message and exit
-q FILTER Generic network sniff
--update Update Zarp
Services:
--wap Wireless access point
--ftp FTP server
--http HTTP Server
--smb SMB Service
--ssh SSH Server
--telnet Telnet server
Scanners:
-w Wireless AP Scan
-s Network scanner
--service-scan Service scanner
bryan@debdev:~/tools/zarp$
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Rooted termux-linux tool airmon-ng suite (for all your wireless cracking needs)
twitter.com/UndercOdeTC
🦑 Requirements
1) tcpdump
2) libmproxy (packaged with zarp)
3) paramiko (SSH service)
4) nfqueue-bindings (packet modifier)
🦑 The recommended installation process is to run:
1) git clone git://github.com/hatRiot/zarp.git
2) pip install -r requirements.txt
3) You can then run:
4) sudo python zarp.py --update
to update zarp. The update flag will not work if you download the tarball from the Git page.
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
> Scapy comes packaged with Zarp and no installation is required. Wifite is used for wireless AP cracking; a specific version (ballast-dev branch) is required.
> This comes packaged with zarp. There are some dependencies required for Scapy, but most should be pretty easy to install or already be installed.
🦑 Tool Overview
Broad categories are (see wiki for more information on these):
1) Poisoners
2) Denial of Service
3) Sniffers
4) Scanners
5) Services
6) Parameter
7) Attacks
🦑usage: zarp.py [-h] [-q FILTER] [--update] [--wap] [--ftp] [--http] [--smb]
[--ssh] [--telnet] [-w] [-s] [--service-scan]
optional arguments:
-h, --help show this help message and exit
-q FILTER Generic network sniff
--update Update Zarp
Services:
--wap Wireless access point
--ftp FTP server
--http HTTP Server
--smb SMB Service
--ssh SSH Server
--telnet Telnet server
Scanners:
-w Wireless AP Scan
-s Network scanner
--service-scan Service scanner
bryan@debdev:~/tools/zarp$
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Open Termux (you can download the application from google store)
>good pentesting package for termux
pinterest.com/UndercOdeOfficial
🦑𝕀ℕ𝕊𝕋𝔸𝕃𝕃𝕀𝕊𝔸𝕋𝕀𝕆ℕ & ℝ𝕌ℕ:
1) pkg install git
2) pkg install python
3) git clone https://github.com/thehackingsage/hacktronian.git
4) cd hacktronian
5) chmod +x hacktronian.py
6) python2 hacktronian.py
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Open Termux (you can download the application from google store)
>good pentesting package for termux
pinterest.com/UndercOdeOfficial
🦑𝕀ℕ𝕊𝕋𝔸𝕃𝕃𝕀𝕊𝔸𝕋𝕀𝕆ℕ & ℝ𝕌ℕ:
1) pkg install git
2) pkg install python
3) git clone https://github.com/thehackingsage/hacktronian.git
4) cd hacktronian
5) chmod +x hacktronian.py
6) python2 hacktronian.py
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Well You got Now more than 500 Termux-linux tools posted here
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑What is Integrator.exe Virus, Process How it Works ?
Integrator.exe is an executable file that is part of the Auslogics BoostSpeed program developed by Auslogics Software Pty Ltd. The software is usually about 62.71 MB in size.
twitter.com/UndercOdeTC
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
Is Integrator.exe safe, or is it a virus or malware?
1) The first thing that will help you determine if a particular file is a legitimate Windows process or a virus, is the location of the executable itself. For example, a process like Integrator.exe should run from C:\Program Files\auslogics\auslogics boostspeed\boostspeed.exe and not elsewhere.
2)To confirm, open the Task Manager, go to View -> Select Columns and select "Image Path Name" to add a location column to your Task Manager. If you find a suspicious directory here, it may be a good idea to investigate this process further.
3) Another tool that can sometimes help you detect bad processes is Microsoft's Process Explorer. Start the program (it does not require installation) and activate "Check Legends" under Options. Now go to View -> Select Columns and add "Verified Signer" as one of the columns.
4) If the "Verified Signer" status of a process is listed as "Unable to Verify", you should take a moment look at the process. Not all good Windows processes have a Verified Signature label, but neither do any of the bad ones.
5) The most important facts about Integrator.exe:
>Located in C:\Program Files\Auslogics\Auslogics BoostSpeed\ subfolder;
>Publisher: Auslogics Software Pty Ltd
> Full Path: C:\Program Files\auslogics\auslogics boostspeed\boostspeed.exe
Help file: www.auslogics.com/en/support
Publisher URL: www.auslogics.com/en
Known to be up to 62.71 MB in size on most Windows;
6) If you had any difficulties with this executable, you should determine if it's trustworthy before deleting Integrator.exe. To do this, find this process in Task Manager.
7) Find its location (it should be in C:\Program Files\Auslogics\Auslogics BoostSpeed\) and compare the size etc with the above facts.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑What is Integrator.exe Virus, Process How it Works ?
Integrator.exe is an executable file that is part of the Auslogics BoostSpeed program developed by Auslogics Software Pty Ltd. The software is usually about 62.71 MB in size.
twitter.com/UndercOdeTC
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
Is Integrator.exe safe, or is it a virus or malware?
1) The first thing that will help you determine if a particular file is a legitimate Windows process or a virus, is the location of the executable itself. For example, a process like Integrator.exe should run from C:\Program Files\auslogics\auslogics boostspeed\boostspeed.exe and not elsewhere.
2)To confirm, open the Task Manager, go to View -> Select Columns and select "Image Path Name" to add a location column to your Task Manager. If you find a suspicious directory here, it may be a good idea to investigate this process further.
3) Another tool that can sometimes help you detect bad processes is Microsoft's Process Explorer. Start the program (it does not require installation) and activate "Check Legends" under Options. Now go to View -> Select Columns and add "Verified Signer" as one of the columns.
4) If the "Verified Signer" status of a process is listed as "Unable to Verify", you should take a moment look at the process. Not all good Windows processes have a Verified Signature label, but neither do any of the bad ones.
5) The most important facts about Integrator.exe:
>Located in C:\Program Files\Auslogics\Auslogics BoostSpeed\ subfolder;
>Publisher: Auslogics Software Pty Ltd
> Full Path: C:\Program Files\auslogics\auslogics boostspeed\boostspeed.exe
Help file: www.auslogics.com/en/support
Publisher URL: www.auslogics.com/en
Known to be up to 62.71 MB in size on most Windows;
6) If you had any difficulties with this executable, you should determine if it's trustworthy before deleting Integrator.exe. To do this, find this process in Task Manager.
7) Find its location (it should be in C:\Program Files\Auslogics\Auslogics BoostSpeed\) and compare the size etc with the above facts.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Can I remove or delete Integrator.exe?
You should not delete a safe executable file without a valid reason, as this may affect the performance of any associated programs that use that file. Be sure to keep your software and programs up to date to avoid future problems caused by corrupted files. With regard to software functionality issues, check driver and software updates more often, so there is little or no risk of such problems occurring.
pinterest.com/UndercOdeOfficial
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) According to various sources online, 69% of people remove this file, so it may be harmful, but it is recommended that you check the trustworthiness of this executable yourself to determine if it is safe or a virus. The best diagnosis for these suspicious files is a complete system analysis with Reimage. If the file is classified as malicious, these applications will also delete Integrator.exe and get rid of the associated malware.
2) However, if it is not a virus and you need to delete Integrator.exe, then you can uninstall Auslogics BoostSpeed from your computer using its uninstaller, which should be located at: "C:\Program Files\Auslogics\Auslogics BoostSpeed\unins000.exe". If you cannot find it's uninstaller, then you may need to uninstall Auslogics BoostSpeed to completely delete Integrator.exe. You can use the Add/Remove Program function in the Windows Control Panel.
1) In the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then under Programs:
o Windows Vista/7/8.1/10: Click Uninstall a Program.
o Windows XP: Click Add or Remove Programs.
2) When you find the program Auslogics BoostSpeed, click it, and then:
o Windows Vista/7/8.1/10: Click Uninstall.
o Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
3) Follow the prompts to remove Auslogics BoostSpeed
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Can I remove or delete Integrator.exe?
You should not delete a safe executable file without a valid reason, as this may affect the performance of any associated programs that use that file. Be sure to keep your software and programs up to date to avoid future problems caused by corrupted files. With regard to software functionality issues, check driver and software updates more often, so there is little or no risk of such problems occurring.
pinterest.com/UndercOdeOfficial
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) According to various sources online, 69% of people remove this file, so it may be harmful, but it is recommended that you check the trustworthiness of this executable yourself to determine if it is safe or a virus. The best diagnosis for these suspicious files is a complete system analysis with Reimage. If the file is classified as malicious, these applications will also delete Integrator.exe and get rid of the associated malware.
2) However, if it is not a virus and you need to delete Integrator.exe, then you can uninstall Auslogics BoostSpeed from your computer using its uninstaller, which should be located at: "C:\Program Files\Auslogics\Auslogics BoostSpeed\unins000.exe". If you cannot find it's uninstaller, then you may need to uninstall Auslogics BoostSpeed to completely delete Integrator.exe. You can use the Add/Remove Program function in the Windows Control Panel.
1) In the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then under Programs:
o Windows Vista/7/8.1/10: Click Uninstall a Program.
o Windows XP: Click Add or Remove Programs.
2) When you find the program Auslogics BoostSpeed, click it, and then:
o Windows Vista/7/8.1/10: Click Uninstall.
o Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
3) Follow the prompts to remove Auslogics BoostSpeed
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Common Integrator.exe Virus error messages
The most common Integrator.exe errors that can appear are:
1) "Integrator.exe Application Error."
2) "Integrator.exe failed."
3) "Integrator.exe has encountered a problem and needs to close. We are sorry for the inconvenience."
4) "Integrator.exe is not a valid Win32 application."
5) "Integrator.exe is not running."
6) "Integrator.exe not found."
7) "Cannot find Integrator.exe."
8) "Error starting program: Integrator.exe."
9) "Faulting Application Path: Integrator.exe."
twitter.com/UndercOdeTes
🦑 These .exe error messages can occur during the installation of a program, during the execution of it's associate software program, Auslogics BoostSpeed, during the startup or shutdown of Windows, or even during the installation of the Windows operating system. Keeping a record of when and where your Integrator.exe error occurs is important information when it comes to troubleshooting.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Common Integrator.exe Virus error messages
The most common Integrator.exe errors that can appear are:
1) "Integrator.exe Application Error."
2) "Integrator.exe failed."
3) "Integrator.exe has encountered a problem and needs to close. We are sorry for the inconvenience."
4) "Integrator.exe is not a valid Win32 application."
5) "Integrator.exe is not running."
6) "Integrator.exe not found."
7) "Cannot find Integrator.exe."
8) "Error starting program: Integrator.exe."
9) "Faulting Application Path: Integrator.exe."
twitter.com/UndercOdeTes
🦑 These .exe error messages can occur during the installation of a program, during the execution of it's associate software program, Auslogics BoostSpeed, during the startup or shutdown of Windows, or even during the installation of the Windows operating system. Keeping a record of when and where your Integrator.exe error occurs is important information when it comes to troubleshooting.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 How to fix Integrator.exe > Speedup any windows-hidden trick :
A clean and tidy computer is one of the best ways to avoid problems with Auslogics BoostSpeed. This means performing malware scans, cleaning your hard disk with cleanmgr and sfc /scannow, uninstalling programs you no longer need, monitoring any auto-start programs (with msconfig), and enabling automatic Windows updates. Don't forget to always make regular backups or at least define recovery points.
t.me/UndercOdeTesting
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) If you have a bigger problem, try to remember the last thing you did or the last thing you installed before the problem.
2) Use the resmon command to identify the processes that are causing your problem. Even in case of serious problems, instead of reinstalling Windows, you should try to repair your installation or, in the case of
Windows 8-10 , by executing the command DISM.exe /Online /Cleanup-image /Restorehealth. This allows you to repair the operating system without data loss.
2) To help you analyze the Integrator.exe process on your computer, you may find the following programs useful: Security Task Manager displays all Windows tasks running, including built-in hidden processes such as keyboard and browser monitoring or auto-start entries. A single security risk rating indicates the probability that it is spyware, malware or a potential Trojan horse.
3) This anti-virus detects and removes spyware, adware, Trojans, keyloggers, malware and trackers from your hard disk.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 How to fix Integrator.exe > Speedup any windows-hidden trick :
A clean and tidy computer is one of the best ways to avoid problems with Auslogics BoostSpeed. This means performing malware scans, cleaning your hard disk with cleanmgr and sfc /scannow, uninstalling programs you no longer need, monitoring any auto-start programs (with msconfig), and enabling automatic Windows updates. Don't forget to always make regular backups or at least define recovery points.
t.me/UndercOdeTesting
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) If you have a bigger problem, try to remember the last thing you did or the last thing you installed before the problem.
2) Use the resmon command to identify the processes that are causing your problem. Even in case of serious problems, instead of reinstalling Windows, you should try to repair your installation or, in the case of
Windows 8-10 , by executing the command DISM.exe /Online /Cleanup-image /Restorehealth. This allows you to repair the operating system without data loss.
2) To help you analyze the Integrator.exe process on your computer, you may find the following programs useful: Security Task Manager displays all Windows tasks running, including built-in hidden processes such as keyboard and browser monitoring or auto-start entries. A single security risk rating indicates the probability that it is spyware, malware or a potential Trojan horse.
3) This anti-virus detects and removes spyware, adware, Trojans, keyloggers, malware and trackers from your hard disk.
@UndercOdeOfficial
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Cracking Password for any local user-kali-parrot :
instagram.com/UndercOdeTestingCompany
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) Physical access attacks are similar to elevating users' rights.
2) That is, when an ordinary user logs in to the system, the passwords of other local user accounts are cracked.
2) In Linux, an ordinary user can perform certain operations on behalf of other users through the su command, which means that the user can elevate his permissions on Linux / Unix systems.
3) In this case, you can use the SUCrack tool to brute-force the password of the local user account using su to complete subsequent penetration attacks.
4) This section will introduce using SUCrack tool to attack this user.
SUCrack is a multi-threaded tool that allows users to brute force the password of a local user account using su. Several options commonly used by this tool are shown below.:
--help: View SUCrack's help file.
-l: Modify the user who attempts to attack the login.
-s: Sets the interval for displaying statistics. The default time is 3 seconds.
-a: Allows the user to set whether to use ANSI escape codes.
-w: is the number of threads available in SUCrack. Because SUCrack is
multi-threaded, users can specify the number of threads they want to run. It is recommended to use only one, because when each login attempt fails, the connection will be retried after a delay of 3 seconds.
[Example 8-8] Use SUCrack to crack the password of the local user. When using the SUCrack command, you need to specify a password file. Otherwise, you will get a funny prompt message. The execution command is as follows:
$ sucrack /usr/share/wordlists/wordlist.txt
password is: 123456
5) As you can see from the output, the password of the local user root is 123456. Because the su command is used, when no user is specified, the root user is used by default.
6) Therefore, after executing the above command, the password of root user root is cracked.
7) If the user wants to set two threads, display statistics every 6 seconds and want to set to use ANSI escape codes. The execution command is as follows:
$ sucrack -w 2 -s 6 -a /usr/share/wordlists/wordlist.txt
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Cracking Password for any local user-kali-parrot :
instagram.com/UndercOdeTestingCompany
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
1) Physical access attacks are similar to elevating users' rights.
2) That is, when an ordinary user logs in to the system, the passwords of other local user accounts are cracked.
2) In Linux, an ordinary user can perform certain operations on behalf of other users through the su command, which means that the user can elevate his permissions on Linux / Unix systems.
3) In this case, you can use the SUCrack tool to brute-force the password of the local user account using su to complete subsequent penetration attacks.
4) This section will introduce using SUCrack tool to attack this user.
SUCrack is a multi-threaded tool that allows users to brute force the password of a local user account using su. Several options commonly used by this tool are shown below.:
--help: View SUCrack's help file.
-l: Modify the user who attempts to attack the login.
-s: Sets the interval for displaying statistics. The default time is 3 seconds.
-a: Allows the user to set whether to use ANSI escape codes.
-w: is the number of threads available in SUCrack. Because SUCrack is
multi-threaded, users can specify the number of threads they want to run. It is recommended to use only one, because when each login attempt fails, the connection will be retried after a delay of 3 seconds.
[Example 8-8] Use SUCrack to crack the password of the local user. When using the SUCrack command, you need to specify a password file. Otherwise, you will get a funny prompt message. The execution command is as follows:
$ sucrack /usr/share/wordlists/wordlist.txt
password is: 123456
5) As you can see from the output, the password of the local user root is 123456. Because the su command is used, when no user is specified, the root user is used by default.
6) Therefore, after executing the above command, the password of root user root is cracked.
7) If the user wants to set two threads, display statistics every 6 seconds and want to set to use ANSI escape codes. The execution command is as follows:
$ sucrack -w 2 -s 6 -a /usr/share/wordlists/wordlist.txt
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Wirless -wifi attack-kali-parrot-debian-ubuntu (aslo root android)
pinterest.com/UndercOdeOfficial
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
Wisdom Snipping Tool Kismet guide by Underc0de
> If you want to perform a wireless network penetration test, you must first scan all valid wireless access points. Just in Kali Linux, Kismet, a wireless network sniffing tool, is provided. Use this tool to measure the surrounding wireless signals and see all available wireless access points. This section will introduce sniffing wireless networks using Kismet tools.
1) Start Kismet tool. The execution command is as follows:
root@kali:~# kismet
2) Terminal extension
> This interface is used to set whether to use the default color of the terminal. Because Kismet's default color is gray, some terminals may not be displayed. Use the default colors here, select Yes, the interface will display
3) The interface prompts that the Kismet tool is running as the root user. At this time, select OK, and the interface will shown
4) The interface prompts whether to start the Kismet service automatically. Select Yes, the interface will shown
5) This interface displays some information for setting up Kismet service. Use the default settings here and select Start, the interface will shown
6) This interface displays package resources that have not been defined. Whether to add them now. Select Yes here, the interface will shown
7) Specify the wireless network card interface and description information on this interface. In Intf, enter the wireless network card interface. If the wireless network card is already in listening mode, you can enter wlan0 or mon0. Other information may not be added. Then click the Add button
8) Select the Close Console Window button on this interface, and the interface will be displayed.
9) The information displayed on this interface is that it is sniffing the signals in the wireless network. When running for a certain period of time, stop modifying. Click the Kismet menu option on this interface and select the Quit command
10) After pressing the Quit command
11) Stop Kismet service
Click Kill on this interface to stop Kismet service and exit terminal mode. At this point, the terminal will display some log information
12) the KISMET IS SHUTTING DOWN section you will see that several log files are closed.
> These log files are stored in the / root / directory by default. In these log files, the time when the log was generated is shown. These times are very helpful when running Kismet many times or days.
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Wirless -wifi attack-kali-parrot-debian-ubuntu (aslo root android)
pinterest.com/UndercOdeOfficial
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
Wisdom Snipping Tool Kismet guide by Underc0de
> If you want to perform a wireless network penetration test, you must first scan all valid wireless access points. Just in Kali Linux, Kismet, a wireless network sniffing tool, is provided. Use this tool to measure the surrounding wireless signals and see all available wireless access points. This section will introduce sniffing wireless networks using Kismet tools.
1) Start Kismet tool. The execution command is as follows:
root@kali:~# kismet
2) Terminal extension
> This interface is used to set whether to use the default color of the terminal. Because Kismet's default color is gray, some terminals may not be displayed. Use the default colors here, select Yes, the interface will display
3) The interface prompts that the Kismet tool is running as the root user. At this time, select OK, and the interface will shown
4) The interface prompts whether to start the Kismet service automatically. Select Yes, the interface will shown
5) This interface displays some information for setting up Kismet service. Use the default settings here and select Start, the interface will shown
6) This interface displays package resources that have not been defined. Whether to add them now. Select Yes here, the interface will shown
7) Specify the wireless network card interface and description information on this interface. In Intf, enter the wireless network card interface. If the wireless network card is already in listening mode, you can enter wlan0 or mon0. Other information may not be added. Then click the Add button
8) Select the Close Console Window button on this interface, and the interface will be displayed.
9) The information displayed on this interface is that it is sniffing the signals in the wireless network. When running for a certain period of time, stop modifying. Click the Kismet menu option on this interface and select the Quit command
10) After pressing the Quit command
11) Stop Kismet service
Click Kill on this interface to stop Kismet service and exit terminal mode. At this point, the terminal will display some log information
12) the KISMET IS SHUTTING DOWN section you will see that several log files are closed.
> These log files are stored in the / root / directory by default. In these log files, the time when the log was generated is shown. These times are very helpful when running Kismet many times or days.
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 How analyse packages by kismet ?
instagram.com/UndercOdeTesting
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
analyze the data captured above:
1) Change to the / root / directory and use the ls command to view the log file generated above. The execution command is as follows:
2) root@kali:~# ls Kismet-20140723-17-19-48-1.*
Kismet-20140723-17-19-48-1.alert Kismet-20140723-17-19-48-1.netxml
Kismet-20140723-17-19-48-1.gpsxml Kismet-20140723-17-19-48-1.pcapdump
Kismet-20140723-17-19-48-1.nettxt
3) From the output, you can see that there are five log files with different suffix names. All information generated by the Kismet tool is stored in these files. The following describes the formats of these files.
alert: This file includes all warning messages.
4) gpsxml: If a GPS source is used, the relevant GPS data is saved in this file.
5) nettxt: Includes all collected text output information.
6) netxml: Includes all data in XML format.
7) pcapdump: Includes packets captured throughout the session.
The following mainly introduces the tools of PCAP and Text files.
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 How analyse packages by kismet ?
instagram.com/UndercOdeTesting
🦑 𝕃𝔼𝕋𝕊 𝕊𝕋𝔸ℝ𝕋 :
analyze the data captured above:
1) Change to the / root / directory and use the ls command to view the log file generated above. The execution command is as follows:
2) root@kali:~# ls Kismet-20140723-17-19-48-1.*
Kismet-20140723-17-19-48-1.alert Kismet-20140723-17-19-48-1.netxml
Kismet-20140723-17-19-48-1.gpsxml Kismet-20140723-17-19-48-1.pcapdump
Kismet-20140723-17-19-48-1.nettxt
3) From the output, you can see that there are five log files with different suffix names. All information generated by the Kismet tool is stored in these files. The following describes the formats of these files.
alert: This file includes all warning messages.
4) gpsxml: If a GPS source is used, the relevant GPS data is saved in this file.
5) nettxt: Includes all collected text output information.
6) netxml: Includes all data in XML format.
7) pcapdump: Includes packets captured throughout the session.
The following mainly introduces the tools of PCAP and Text files.
Written by UndercOde
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁