Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
The tool generates a wordlist based on a set of words entered by the user.
For example, during penetration testing, you need to gain access to some service, device, account, or Wi-Fi network that is password protected. For example, let it be the Wi-Fi network of EvilCorp. Sometimes, a password...
ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of scripts, lived as a rolling virtual machine, existed as code to build a Linux ISO, and has now been converted to a set of ansible playbooks. Why Ansible? Why...
A simple C2 framework against browser isolation proxies
(for testing / research purposes only!)
About The Project
While I was penetration testing networks that use browser isolation proxies, I noticed that my malware is unable to communicate with its C2 server, although I used a...
Debian 11 bullseye based Voyager 11 is Available to Download, Rodolphe Bachelart has announced the availability of Voyager Live 11, a major new release of the project’s Debian-based desktop Linux distribution with a customised GNOME desktop. This version is derived from the recently-released...
SilentXMRMiner v0.9 - Based on Lime Miner v0.3
Main Features
.NET - Coded in Visual Basic .NET, requires .NET Framework 4.5.
Codedom - No need for external libraries to compile
Injection (Silent) - Hide payload behind another process
CPU & GPU Mining - Can mine on Both CPU...
Ninjutsu-OS is a dedicated Windows 10 OS (Build 1909) that contains more than 800 cybersecurity testing tools. Kali Linux, just from the Windows world. The release is quite fresh, took place on 18.04.2020.
The INSTALLATION of the OS itself is no different from the standard Win 10 installation...
Main Features
.NET - Coded in Visual Basic .NET, requires .NET Framework 4.0.
Codedom - No need for external libraries to compile
Injection (Silent) - Hide payload behind another process
CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD)
Idle Mining -...
uEmu is a tiny cute emulator plugin for IDA based on unicorn engine.
Supports following architectures out of the box: x86, x64, ARM, ARM64, MIPS, MIPS64
What is it GOOD for?
Emulate bare-metal code (bootloaders, embedded firmware, etc)
Emulate standalone functions
What is it BAD for...
GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of this tool is to facilitate the extraction of any service method endpoints buried within a modern GWT application’s obfuscated client-side code and attempt to generate example GWT-RPC...
Features
[1] Auto Updater
Automatically checks for updates when you start the script, and Downloads and Installs if any update is available so.
[2] Utilises the Power of CPU-Cores
Can utilise Maximum no. of Cores available.
This means increases the process of cracking of zip...
A Ransomware and Ransomware Builder for Windows written purely in Python
What's New? (v3.0)
Decryption key validation check before attempting decryption
Overhaul to support Python 3.6 and above
Drastically simplified dependency installation
Crypter - 3.5
Implemented Time...
ADBSploit
A python-based tool for exploiting and managing Android devices via ADB.
Functionalities
v0.2
Added:
Fixed setup and installation
Extract Contacts
Extract SMS
Send SMS
Recovery Mode
Fastboot Mode
Device Info
Kill Process
v0.1
List Devices
...
Ninjutsu Project
Ninjutsu is Penetration testing/Red Teaming distribution based on Windows focused on Penetration Testing, Red Teaming, Android Penetration Testing.
It includes a full portable arsenal for security experts, but it also includes pre-configured and installed Android Pentesting...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.