Skip to content
30 Jun, 2022
Latest Exploits, Tools News
Toxssin – Open-source Penetration Testing Tool That Automates Exploiting Cross-Site Scripting (XSS)
Uncover -Quickly discover exposed hosts on the internet using multiple search engines.
WEF – 802.11 Offensive Framework To Automate Attacks for WPA, WEP, Hash Cracking, Bluetooth Hacking & More
Agartha – LFI, RCE, Auth, SQLi, Http-Js Payload Generator
BlackBird – OSINT Tool To Search Fast For Accounts By Username Across 85 Sites

SkyNet Tools

The Latest Infosec News, Tools, and Exploits – Got Root?

  • Home
  • Home
  • Articles
  • Exploits
  • News
  • Tools
  • Tutorials
  • Home
  • enumeration

Tag: enumeration

AutoPWN Suite – Automatically Scan For Vulnerabilities & Exploit Systems

June 1, 2022June 1, 2022 Admin
autopwn

How does it work? AutoPWN Suite uses nmap TCP-SYN scan to enumerate the host and detect the version of software running on it. After gathering enough information about the host, AutoPWN Suite automatically generates a […]

Leave a commentToolsautopwn, enumeration, exploitation, scanner

TugaRecon – Pentesting Tool to Enumerate Subdomains

May 1, 2022May 1, 2022 Admin
tugarecon

Tugarecon is a python tool designed to enumerate subdomains using modules. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Bruteforce was integrated as a module to […]

Leave a commentToolsenumeration, python, recon, subdomain

DOME – Fast & Reliable Python Subdomain Enumeration Tool

March 10, 2022March 10, 2022 Admin
DOME

Dome is a fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports. This tool is recommended for bug bounty hunters and pentester in their reconnaissance […]

Leave a commentToolsdomain, enumeration, python

linWinPwn – Automate Active Directory Enumeration and Exploitation

February 7, 2022February 7, 2022 Admin
lilwinpwn

linWinPwn is a bash script that automates a number of Active Directory Enumeration and Exploitation steps. The script leverages and is dependent of a number of tools including: impacket, bloodhound, crackmapexec, ldapdomaindump, lsassy, smbmap, kerbrute, […]

Leave a commentToolsactive directory, automation, bash, enumeration, exploitation

Anubis – Subdomain Enumeration & Information Gathering Tool

August 4, 2021August 4, 2021 Admin
Anubis

Anubis is a subdomain enumeration and information gathering tool. Anubis collates data from a variety of sources, including HackerTarget, DNSDumpster, x509 certs, VirusTotal, Google, Pkey, Sublist3r, Shodan and NetCraft. Anubis also has a sister project, […]

Leave a commentToolsAnubis, enumeration, information gathering

Altdns – Subdomain Discovery Through Alterations & Permutations

May 26, 2021May 26, 2021 Admin
Altdns

Altdns is a DNS recon tool that allows for the discovery of subdomains that conform to patterns. Altdns takes in words that could be present in subdomains under a domain (such as test, dev, staging) […]

Leave a commentToolsAltdns, enumeration, subdomain

Scilla – Information Gathering Tool DNS / Subdomains / Ports / Directories Enumeration

February 8, 2021February 10, 2021 Admin
scilla

Example Installation First of all, clone the repo locally git clone https://github.com/edoardottt/scilla.git Scilla has external dependencies, so they need to be pulled in: go get Linux (Requires high perms, run with sudo) make linux make […]

Leave a commentToolsdns, enumeration, ports, scilla, Subdomains

Sudomy – Subdomain Enumeration & Analysis

February 8, 2021February 8, 2021 Admin
Sudomy

Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities. Features ! For recent time, Sudomy has […]

Leave a commentToolsanalysis, enumeration, subdomain, Sudomy

Sifter a Osint, Recon & Vulnerability Scanner

November 15, 2020November 15, 2020 Admin
sifter

Overview Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and […]

Exploitsenumeration, OSINT, recon, sifter, vulnerability scanner

CTFR – Get HTTPS Subdomains Through Certificate Transparency Logs

November 9, 2020November 9, 2020 Admin
ctfr

Do you miss AXFR technique? This tool allows to get the subdomains from a HTTPS website in a few seconds.How it works? CTFR does not use neither dictionary attack nor brute-force, it just abuses of […]

Toolsctfr, enumeration, https, subdomain

Posts navigation

1 2 3 Next

Latest Tools

Tags

App (18) csrf (20) dns (18) edureka (18) enumeration (23) ethical hacking (31) exploit (103) framework (27) Hacker (18) hacker exploit (59) hackers (49) hackersploit (65) hacking (126) information gathering (18) infosec (33) injection (24) kali (40) kali linux (59) linux (96) linux commands (20) linux tutorial (21) malware (17) metasploit (22) network (22) news (22) nmap (28) OSINT (18) Penetration (28) pentesting (49) python (61) rce (32) remote code execution (20) scanner (38) security (22) sqli (29) ssh (19) tools (90) tutorial (198) Walkthrough (31) web (34) wifi (44) windows (21) wordpress (22) xss (29) youtube (18)
Check up status of websites with DownForJust.Medownforjust.me

Latest News

hacked

Puget Sound Educational Service District Says King and Pierce County Schools Hacked

  • 14 Jan 2021

On January 12th 2021 Puget Sound Educational Service District released a statement saying their networks were hacked. According to their...

ticketmaster

Ticketmaster To Pay $10 Million in Fines After Hacking Competitor.

  • 4 Jan 2021

According the Department of Justice in the United States Ticketmaster, the ticket sales company, is ordered to pay $10 million...

spotify

Spotify Suffers Breach of User Information

  • 24 Nov 2020

A large number of Spotify users have already been urged to examine their protection safety carrying out a main cyber...

tesla

Easy Tesla Model X Keyfob Exploit Breaks in No Time

  • 24 Nov 2020

In accordance with a written report published today, Wouters explained this third attack performs as a result of defect inside...

Copyright SkyNetTools© All rights reserved
Magazine Plus by WEN Themes
Posting....
RSS
Follow by Email
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet