UFONet – HTTP Botnet
UFONet – is a free software, P2P and cryptographic -disruptive toolkit- that allows to perform DoS and DDoS attacks; on the Layer 7 (APP/HTTP) through the exploitation of Open Redirect vectors on third-party websites to […]
The Latest Infosec News, Tools, and Exploits – Got Root?
UFONet – is a free software, P2P and cryptographic -disruptive toolkit- that allows to perform DoS and DDoS attacks; on the Layer 7 (APP/HTTP) through the exploitation of Open Redirect vectors on third-party websites to […]
Introduction Dirble is a website directory scanning tool for Windows and Linux. It’s designed to be fast to run and easy to use. How to Use Download one of the precompiled binaries for Linux, Windows, […]
Disclaimer This tool is ONLY FOR testing. Author is not responsible for anything you do with this tool. Installation Install node js and npm if not installed yet Clone this repo For that, open Terminal/CMD […]
A powerful framework for network traffic analysis and security monitoring. Key Features — Documentation — Getting Started — Development — License Follow us on Twitter at @zeekurity. Key Features In-depth Analysis Zeek ships with analyzers […]
Cross Site “Scripter” (aka XSSer) is an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications. It provides several options to try to bypass certain filters and various special techniques for code […]
Bulwark is an organizational asset and vulnerability management tool designed for building and generating application security reports. Note Please keep in mind, this project is very early in the development phase. Installing $ git clone […]
Captcha Intruder is an automatic pentesting tool to bypass captchas. CIntruder is released under the GPLv3. You can find the full license text in the LICENSE file. Web: https://cintruder.03c8.net Installing: CIntruder runs on many platforms. […]
About Arissploit Framework Arissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools. Getting started Arissploit […]
AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature by Microsoft) allows a remote attacker to view his victim’s […]