Skip to content
02 Feb, 2023
Latest Exploits, Tools News
Userefuzz – User-Agent , X-Forwarded-For & Referer SQLI Fuzzer Made With Python
Wardriving WIFI & Cellular Networks On Android Using WiGLE
Shells – A Script For Generating Common Revshells Fast & Easy
Mubeng – Incredibly Fast Proxy Checker & IP Rotator With Ease
TruffleHog – Find Leaked Credentials In GitHub, GitLab, Filesystems, S3, & Circle CI

SkyNet Tools

The Latest Infosec News, Tools, and Exploits – Got Root?

  • Home
  • Home
  • Articles
  • Exploits
  • News
  • Tools
  • Tutorials

FTX Hacked Hours After Filing For Bankruptcy

November 12, 2022November 12, 2022 Admin
ftx

On Saturday, FTX CEO John Ray confirmed via Twitter that FTX and FTX US were hacked. Ironically this attack happened hours after the company filed for bankruptcy protection. Overnight FTX saw potentially $515 million drained […]

Leave a commentNews

RustScan – The Modern Port Scanner. Fast, Smart, Effective

November 7, 2022November 7, 2022 Admin
rustscan

The Modern Port Scanner. Find ports quickly (3 seconds at its fastest). Run scripts through our scripting engine (Python, Lua, Shell supported). Features Why RustScan? RustScan is a modern take on the port scanner. Sleek […]

Leave a commentTools

APTRS (Automated Penetration Testing Reporting System) – Automated Reporting Tool in Python & Django

October 31, 2022October 31, 2022 Admin
APTRS

APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an […]

Leave a commentToolspentesting, python

Hoaxshell – Windows Reverse Shell Payload Generator & Handler That Abuses The HTTP(S) Protocol To Establish A Beacon-Like Reverse Shell

October 25, 2022October 25, 2022 Admin
hoaxshell

hoaxshell is a Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell, based on the following concept: This concept (which could possibly be implemented by using […]

Leave a commentToolswindows

SDomDiscover – Easy to Use Python Tool for DNS Reconnaissance

July 21, 2022July 21, 2022 Admin
SDomDiscover

A easy-to-use python tool to perform dns recon with multiple options Installation: It can be installed in any OS with python3 Manual installation git clone https://github.com/D3Ext/SDomDiscover cd SDomDiscover pip3 install -r requirements.txt One-liner git clone […]

Leave a commentToolsdns, python, recon, Reconnaissance

Parse & Resolve Active Directory principal’s DACL, Identify Inbound Access Allowed Privileges, & Resolve SIDS Of Inbound Permissions

July 14, 2022July 14, 2022 Admin
aced

Aced is a tool to parse and resolve a single targeted Active Directory principal’s DACL. Aced will identify interesting inbound access allowed privileges against the targeted account, resolve the SIDS of the inbound permissions, and […]

Leave a commentTools

ZenBuster – Multi-Threaded, Multi-Platform URL Enumeration Tool Written In Python

July 11, 2022July 11, 2022 Admin
zenbuster

This software is intended for use in CTF challenges, or by security professionals to gather information on their targets: It is capable of brute-force enumerating subdomains and also URI resources (directories/files). Both methods of enumeration […]

Leave a commentToolsenumeration, python

SocialPwned – OSINT Tool To Get Emails Addresses, From Target, Published On Social Networks Like Instagram, Linkedin & Twitter

July 9, 2022July 14, 2022 Admin
SocialPwned

SocialPwned is an OSINT tool that allows getting the emails, from a target, published on social networks like Instagram, Linkedin, and Twitter to find the possible credential leaks in PwnDB or Dehashed and obtain a […]

Leave a commentToolsscanner

Python 3 Network Packet Sniffer

July 8, 2022July 8, 2022 Admin
Packet Sniffer

A Network Packet Sniffer developed in Python 3. Packets are disassembled as they arrive at a given network interface controller and their information is displayed on the screen. This application depends exclusively on the NETProtocols […]

Leave a commentTools

Psudohash – Password List Generator For Orchestrating Brute Force Attacks

July 5, 2022July 5, 2022 Admin
Psudohash

Psudohash is a password list generator for orchestrating brute force attacks. It imitates certain password creation patterns commonly used by humans, like substituting a word’s letters with symbols or numbers, using char-case variations, adding a […]

Leave a commentToolsbruteforce, passwords

Posts navigation

Previous 1 2 3 … 103 Next

Latest Tools

Tags

bruteforce (17) csrf (20) cyber security (17) dns (19) enumeration (24) ethical hacking (31) exploit (103) framework (27) hacked (17) hacker exploit (59) hacking (126) information gathering (18) infosec (33) injection (24) kali (40) kali linux (59) linux (96) linux commands (20) linux tutorial (21) malware (17) metasploit (22) network (22) news (22) nmap (28) OSINT (18) passwords (17) Penetration (28) pentesting (50) python (64) rce (32) recon (16) remote code execution (20) scanner (41) Scanning (16) security (22) sqli (30) ssh (20) tools (89) tutorial (198) Walkthrough (31) web (34) wifi (45) windows (22) wordpress (22) xss (30)
Check up status of websites with DownForJust.Medownforjust.me

Latest News

ftx

FTX Hacked Hours After Filing For Bankruptcy

  • 12 Nov 2022

On Saturday, FTX CEO John Ray confirmed via Twitter that FTX and FTX US were hacked. Ironically this attack happened...

hacked

Puget Sound Educational Service District Says King and Pierce County Schools Hacked

  • 14 Jan 2021

On January 12th 2021 Puget Sound Educational Service District released a statement saying their networks were hacked. According to their...

ticketmaster

Ticketmaster To Pay $10 Million in Fines After Hacking Competitor.

  • 4 Jan 2021

According the Department of Justice in the United States Ticketmaster, the ticket sales company, is ordered to pay $10 million...

spotify

Spotify Suffers Breach of User Information

  • 24 Nov 2020

A large number of Spotify users have already been urged to examine their protection safety carrying out a main cyber...

Copyright SkyNetTools© All rights reserved
Magazine Plus by WEN Themes
RSS
Follow by Email
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet