Skip to content
30 Jun, 2022
Latest Exploits, Tools News
Toxssin – Open-source Penetration Testing Tool That Automates Exploiting Cross-Site Scripting (XSS)
Uncover -Quickly discover exposed hosts on the internet using multiple search engines.
WEF – 802.11 Offensive Framework To Automate Attacks for WPA, WEP, Hash Cracking, Bluetooth Hacking & More
Agartha – LFI, RCE, Auth, SQLi, Http-Js Payload Generator
BlackBird – OSINT Tool To Search Fast For Accounts By Username Across 85 Sites

SkyNet Tools

The Latest Infosec News, Tools, and Exploits – Got Root?

  • Home
  • Home
  • Articles
  • Exploits
  • News
  • Tools
  • Tutorials
  • Home
  • python

Tag: python

TugaRecon – Pentesting Tool to Enumerate Subdomains

May 1, 2022May 1, 2022 Admin
tugarecon

Tugarecon is a python tool designed to enumerate subdomains using modules. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting. Bruteforce was integrated as a module to […]

Leave a commentToolsenumeration, python, recon, subdomain

DOME – Fast & Reliable Python Subdomain Enumeration Tool

March 10, 2022March 10, 2022 Admin
DOME

Dome is a fast and reliable python script that makes active and/or passive scan to obtain subdomains and search for open ports. This tool is recommended for bug bounty hunters and pentester in their reconnaissance […]

Leave a commentToolsdomain, enumeration, python

RecoverPy – Recover Overwritten or Deleted Data.

January 16, 2022January 16, 2022 Admin
recoverpy

You can already find plenty of solutions to recover deleted files, but it can be a hassle to recover overwritten files. RecoverPy searches through every block of your partition to find your request. Demo Installation […]

Leave a commentToolsdata recovery, linux, python

Juumla – Python Tool Developed To Identify Current Joomla Version & Scan For Readable Joomla Config Files

July 20, 2021July 20, 2021 Admin
Juumla

Installing / Getting started A quick guide of how to install and use Juumla. Docker If you want to run Juumla in a Docker container, follow this commands: Pre-requisites Python 3 installed on your machine. […]

Leave a commentToolsconfig files, Joomla, Juumla, python, scanner

OrbitalDump – Multi-Threaded Distributed SSH Brute-Forcing Tool Written in Python

July 6, 2021July 6, 2021 Admin
oribitaldump

When the script is executed without the –proxies switch, it acts just like any other multi-threaded SSH brute-forcing scripts. When the –proxies switch is added, the script pulls a list (usually thousands) of SOCKS4 proxies […]

Leave a commentToolsbruteforce, OrbitalDump, python, ssh

Mail.Rip v2 – SMTP checker / SMTP Cracker for Mailpass Combolists

May 11, 2021May 11, 2021 Admin
smtp

Your SMTP checker / SMTP cracker for mailpass combolists including features like: proxy-support (SOCKS4 / SOCKS5) with automatic proxy-scraper, e-mail delivery test for valid combos (inbox check) and DNS lookup for unknown SMTP-hosts. Overview Legal […]

Leave a commentToolscracking, python, SMTP

Knockpy – Enumerate Subdomains on Target Domain Through a Wordlist

February 19, 2021February 19, 2021 Admin
Knockpy

Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically […]

Leave a commentToolsdns, JSON, Knockpy, python, zone transfer

FinalRecon – The Last Web Recon Tool You’ll Need

February 15, 2021February 15, 2021 Admin
finalrecon

FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of […]

Leave a commentToolsFinalRecon, python, Reconnaissance

Lucifer – A Powerful Penetration Tool For Automating Penetration Tasks

February 8, 2021February 8, 2021 Admin
lucifer

Setup git clone https://github.com/Skiller9090/Lucifer.git cd Lucifer pip install -r requirements.txt python main.py –help If you want the cutting edge changes add -b dev to the end of git clone https://github.com/Skiller9090/Lucifer.git Commands Command Description help Displays […]

Leave a commentToolsautomation, lucifer, python

CrackQ – Python GUI to Manage HashCat Jobs in a Queuing System

January 9, 2021January 9, 2021 Admin
CrackQ

Feature List REST API Remote Python client or JS GUI Cracked passwords analysis and reporting Uses Hashcat API directly via libhashcat, no shell commands Easy installation using docker containers SQL, LDAP or SAML2 Authentication Multi-user […]

Leave a commentToolsCrackQ, Hashcat, python

Posts navigation

1 2 … 7 Next

Latest Tools

Tags

App (18) csrf (20) dns (18) edureka (18) enumeration (23) ethical hacking (31) exploit (103) framework (27) Hacker (18) hacker exploit (59) hackers (49) hackersploit (65) hacking (126) information gathering (18) infosec (33) injection (24) kali (40) kali linux (59) linux (96) linux commands (20) linux tutorial (21) malware (17) metasploit (22) network (22) news (22) nmap (28) OSINT (18) Penetration (28) pentesting (49) python (61) rce (32) remote code execution (20) scanner (38) security (22) sqli (29) ssh (19) tools (90) tutorial (198) Walkthrough (31) web (34) wifi (44) windows (21) wordpress (22) xss (29) youtube (18)
Check up status of websites with DownForJust.Medownforjust.me

Latest News

hacked

Puget Sound Educational Service District Says King and Pierce County Schools Hacked

  • 14 Jan 2021

On January 12th 2021 Puget Sound Educational Service District released a statement saying their networks were hacked. According to their...

ticketmaster

Ticketmaster To Pay $10 Million in Fines After Hacking Competitor.

  • 4 Jan 2021

According the Department of Justice in the United States Ticketmaster, the ticket sales company, is ordered to pay $10 million...

spotify

Spotify Suffers Breach of User Information

  • 24 Nov 2020

A large number of Spotify users have already been urged to examine their protection safety carrying out a main cyber...

tesla

Easy Tesla Model X Keyfob Exploit Breaks in No Time

  • 24 Nov 2020

In accordance with a written report published today, Wouters explained this third attack performs as a result of defect inside...

Copyright SkyNetTools© All rights reserved
Magazine Plus by WEN Themes
Posting....
RSS
Follow by Email
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet