PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
PyExploit:-- #Python #penetration #toolkit.
PyExploit v1.0 Python penetration toolkit can #automate everything for you.
Futures:-
1. #recon :
#Whois
#GeoIP
#Subdomains
#Shodan
PWNED
2. #Vulnerabilities :
#Clickjacking
#Download #Link:-
https://github.com/RiadhBenlamine/PyExploit
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
CSWSH:-- A #command-line tool for Cross-Site #WebSocket #Hijacking.
A command-line tool designed to test and connect to a WebSocket which are #vulnerable to Cross-Site WebSocket Hijacking vulnerability.
#CSWSH tool can connect to both standard and socket.io based WebSockets.
1. A standard WebSocket will have the functionality of sending messages to the server and receiving messages from the server.
2. A socket.io based WebSocket will have only the ping functionality to check if the connection is successful or not.
#Download #Link:-
https://github.com/DeepakPawar95/cswsh
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
GreenDos:-- It is developed convert #Dos Attack to #Ddos to test your #service on the #internet.
1) At first, you have to enter a specific domain as input.
2) It will ping the #Domain that you gave to get the IP.
3) By using #masscan it scans all the #ports in range 1 to 65535 to find the open ones.
4) For the last step, it will send packets from randomly generated source #IP and port to destination.
#Download #Link:-
https://github.com/greenmns/GreenDos
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Eagle Eyes:-- Eagle Eyes is a #powerful low-level #TCP #networking #RAT. Supporting #desktop streaming, #webcam streaming, audio listening, #keylogging & more available from its CLI.
Eagle Eyes is a #spyware #Python program created for #Windows that supports multiple ways to collect #data & automatically save everything organized in folders. It has two shells you will use, the first #shell is to control & manage clients & options. It is also from this shell you have can connect to a client session. This will give a reverse shell-like connection to a specific client with extra built-in commands.
#Download #Link:-
https://github.com/Alvin-22/Eagle-Eyes
Photos from National Cyber Security Services's post
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter
Memhunter:-- Live #Hunting Of #Code #Injection #Techniques.
Memhunter is an endpoint sensor tool that is specialized in detecing resident #malware, improving the threat hunter analysis process and remediation times. The tool detects and reports memory-resident malware living on endpoint processes. Memhunter detects known #malicious #memory injection techniques. The detection #process is performed through live analysis and without needing memory dumps. The tool was designed as a replacement for memory #forensic #volatility #plugins such as malfind and hollowfind. The idea of not requiring memory dumps helps on performing the memory-resident malware threat hunting at scale, without manual #analysis, and without the complex #infrastructure needed to move dumps to forensic environments.
#Download #Link:-
https://github.com/marcosd4h/memhunter