Saker:-- #Flexible #Penetrate #Testing #Auxiliary #Suite.
brief support features:-
1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap
#Download #Link:-
https://github.com/LyleMi/Saker
Saker:-- #Flexible #Penetrate #Testing #Auxiliary #Suite.
brief support features:-
1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap
#Download #Link:-
https://github.com/LyleMi/Saker
brief support features:-
1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap
#Download #Link:-
https://github.com/LyleMi/Saker
Saker:-- #Flexible #Penetrate #Testing #Auxiliary #Suite.
brief support features:-
1. scan website
#information #gathering
#framework #fingerprint
2. #fuzz #web request
#XSS
#SQL #injection
SSRF
XXE
3. #subdomain gathering
4. #port scanner
5. bruteforce
web dir
zip password
domain
6. auxiliary servers
#DNS rebinding
SSRF
XSS
7. third party API integration
crtsh
DNS dumper
#github
#sqlmap
#Download #Link:-
https://github.com/LyleMi/Saker
GitHub
GitHub - LyleMi/Saker: Flexible Penetrate Testing Auxiliary Suite
Flexible Penetrate Testing Auxiliary Suite. Contribute to LyleMi/Saker development by creating an account on GitHub.
Assembly:-- A #modern front-end #development #framework for UI-friendly rapid #prototyping.
#Download #Link:-
https://github.com/Kuipr/Assembly
Assembly:-- A #modern front-end #development #framework for UI-friendly rapid #prototyping.
#Download #Link:-
https://github.com/Kuipr/Assembly
#Download #Link:-
https://github.com/Kuipr/Assembly
Assembly:-- A #modern front-end #development #framework for UI-friendly rapid #prototyping.
#Download #Link:-
https://github.com/Kuipr/Assembly
GitHub
Kuipr/Assembly
A modern front-end development framework for UI-friendly rapid prototyping. - Kuipr/Assembly
Photos from National Cyber Security Services's post
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper
Ropper:-- Display #information about files in different file formats and find gadgets to build #rop chains for different #architectures (x86/x86_64, #ARM/ #ARM64, #MIPS, #PowerPC, #SPARC64). For #disassembly, ropper uses the awesome Capstone #Framework.
$ git clone https://github.com/sashs/ropper.git
$ cd ropper
$ git submodule init
$ git submodule update
$ ./Ropper.py
#Download #Link:-
https://github.com/sashs/Ropper
Photos from National Cyber Security Services's post
ReconCobra:-- Complete #Automated #Pentest #Framework for #Information #Gathering.
The software has 82 Options with full #automation and #powerful information gathering.
#Reconcobra is #Footprinting software for Ultimate Information Gathering
#Kali, #Parrot OS, #BlackArch, #Termux, #Android Led TV.
Introduction:-
1. ReconCobra is useful in #Banks, Private #Organisations and #Ethical #hacker #personnel for legal #auditing.
2. It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. ReconCobra #software can #audit, #firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like #ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & #Enumeration as much as possible of target, to discover and collect most possible information like username, #web #technologies, files, endpoint, #API and much more.
5. It’s the first step to stop #cyber #criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/ReconCobra
ReconCobra:-- Complete #Automated #Pentest #Framework for #Information #Gathering.
The software has 82 Options with full #automation and #powerful information gathering.
#Reconcobra is #Footprinting software for Ultimate Information Gathering
#Kali, #Parrot OS, #BlackArch, #Termux, #Android Led TV.
Introduction:-
1. ReconCobra is useful in #Banks, Private #Organisations and #Ethical #hacker #personnel for legal #auditing.
2. It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. ReconCobra #software can #audit, #firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like #ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & #Enumeration as much as possible of target, to discover and collect most possible information like username, #web #technologies, files, endpoint, #API and much more.
5. It’s the first step to stop #cyber #criminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/ReconCobra
Photos from National Cyber Security Services's post
Tishna:-- Complete #Automated #pentest #framework for #Servers, #Application #Layer to #Web #Security.
Software have 61 Options with full #automation and can be used for web security #swiss #knife.
Brief Introduction:-
1. #Tishna is useful in #Banks, #Private #Organisations and #Ethical #hacker personnel for legal #auditing.
2. It serves as a #defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more #advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. Tishna #software can audit, servers and web-behavior.
5. Tishna can perform #Scanning & #Enumeration as much as possible of the target.
6. It’s the first step to stop #cyber #criminals by securing your Servers and Web Application Security.
7. Tishna is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/Tishna
Tishna:-- Complete #Automated #pentest #framework for #Servers, #Application #Layer to #Web #Security.
Software have 61 Options with full #automation and can be used for web security #swiss #knife.
Brief Introduction:-
1. #Tishna is useful in #Banks, #Private #Organisations and #Ethical #hacker personnel for legal #auditing.
2. It serves as a #defense method to find as much information possible for gaining unauthorized access and intrusion.
3. With the emergence of more #advanced #technology, cybercriminals have also found more ways to get into the system of many organizations.
4. Tishna #software can audit, servers and web-behavior.
5. Tishna can perform #Scanning & #Enumeration as much as possible of the target.
6. It’s the first step to stop #cyber #criminals by securing your Servers and Web Application Security.
7. Tishna is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.
#Download #Link:-
https://github.com/haroonawanofficial/Tishna
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
OSINT-Framework- #OSINT #framework focused on #gathering #information from free #tools or #resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
The framework was originally created with an information #security point of view. Since then, the response from other fields and disciplines has been incredible.
#Download #Link:-
https://github.com/lockfale/OSINT-Framework
Photos from National Cyber Security Services's post
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
Ghost Framework:-- #Android #post #exploitation #framework that uses an Android Debug Bridge to #remotely access an Android device. #Ghost Framework gives you the power and convenience of #remote Android #device #administration.
Why ghost framework?
1. Accessing device shell
INFO: Ghost Framework can be used to access the remote
Android device #shell without using #OpenSSH or other protocols.
2. Emulating device button presses
INFO: Ghost Framework can be used to emulate
button presses on the remote Android device.
3. Removing device password
INFO: Ghost Framework can be used to remove the
remote Android device #password if it was forgotten.
#Downlaod #Link:-
https://github.com/entynetproject/ghost
Photos from National Cyber Security Services's post
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
DroneSploit:-- #Drone #Pentesting #Framework console.
This #CLI framework is based on #sploitkit and is an attempt to gather hacking techniques and #exploits especially focused on drone #hacking. For ease of use, the interface has a layout that looks like #Metasploit.
#Download #Link:-
https://github.com/dhondta/dronesploit
Photos from National Cyber Security Services's post
Bettercap:-- The #Swiss #Army #knife for 802.11, BLE and Ethernet network #reconnaissance and #MITM attacks.
#Bettercap is a #powerful, easily extensible and portable #framework written in #Go which aims to offer to #security #researchers, #redteamers and #reverse #engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking #WiFi networks, #Bluetooth Low Energy devices, #wireless #HID devices, and Ethernet networks.
Main Features:-
1. WiFi networks scanning, de-authentication attack, clientless #PMKID association attack, and automatic #WPA/ #WPA2 client handshakes capture.
2. Bluetooth Low Energy devices scanning, characteristics enumeration, reading, and writing.
3. 2.4Ghz wireless devices scanning and #MouseJacking attacks with over-the-air HID frames injection (with #DuckyScript support).
4. Passive and active IP network hosts probing and recon.
5. #ARP, #DNS and #DHCPv6 spoofers for MITM attacks on IP based networks.
6. Proxies at the packet level, #TCP level and #HTTP/ #HTTPS application-level fully scriptable with easy to implement javascript plugins.
7. A powerful network sniffer for credentials harvesting which can also be used as a network #protocol #fuzzer.
8. A very fast port scanner.
9. A powerful #REST #API with support for asynchronous events notification on #WebSocket to orchestrate your attacks easily.
10. A very convenient #web UI.
More!
#Download #Link:-
https://github.com/bettercap/bettercap
Bettercap:-- The #Swiss #Army #knife for 802.11, BLE and Ethernet network #reconnaissance and #MITM attacks.
#Bettercap is a #powerful, easily extensible and portable #framework written in #Go which aims to offer to #security #researchers, #redteamers and #reverse #engineers an easy to use, all-in-one solution with all the features they might possibly need for performing reconnaissance and attacking #WiFi networks, #Bluetooth Low Energy devices, #wireless #HID devices, and Ethernet networks.
Main Features:-
1. WiFi networks scanning, de-authentication attack, clientless #PMKID association attack, and automatic #WPA/ #WPA2 client handshakes capture.
2. Bluetooth Low Energy devices scanning, characteristics enumeration, reading, and writing.
3. 2.4Ghz wireless devices scanning and #MouseJacking attacks with over-the-air HID frames injection (with #DuckyScript support).
4. Passive and active IP network hosts probing and recon.
5. #ARP, #DNS and #DHCPv6 spoofers for MITM attacks on IP based networks.
6. Proxies at the packet level, #TCP level and #HTTP/ #HTTPS application-level fully scriptable with easy to implement javascript plugins.
7. A powerful network sniffer for credentials harvesting which can also be used as a network #protocol #fuzzer.
8. A very fast port scanner.
9. A powerful #REST #API with support for asynchronous events notification on #WebSocket to orchestrate your attacks easily.
10. A very convenient #web UI.
More!
#Download #Link:-
https://github.com/bettercap/bettercap