Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.
FTP Server Exploitation: Pen Testing Port 21 Like a Pro
Description:
FTP servers running on Port 21 are prime targets for attackers—but for ethical hackers, they’re a goldmine for security testing. Whether you're a penetration tester, cybersecurity analyst, or red teamer, understanding FTP...
Description
Kali contains an array of tools to assist with security assessments and penetration tests. This course will teach you how to use some of those tools to exploit the systems you find, moving you into a position to perform post exploitation tasks.
A large number of security tools are...
An automatic Blind ROP exploitation python tool
Abstract
BROP (Blind ROP) was a technique found by Andrew Bittau from Stanford in 2014.
Original paper
Slides
Most servers like nginx, Apache, MySQL, and forks then communicate with the client. This means canary and addresses stay the...
Description
Learning about PowerShell exploitation techniques and tools is of vital importance for successfully running red team operations or penetration tests in Windows environments.
The ability to make use of readily available tools such as PowerShell when targeting Windows operating...
This is a powershell reverse shell that executes the commands and or scripts that you add to the powerreverse.ps1 file as well as a small library of Post-Exploitation scripts. This also can be used for post-exploitation and lateral movement even. Please use it at your own risk I am not and will...
Purpose
toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of an https server that works as an interpreter for the traffic generated by the malicious JavaScript payload that powers this tool...
A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, automated hash cracking, Bluetooth hacking, and much more.
I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz
Tested and supported...
A fully offensive framework to the 802.11 networks and protocols with different types of attacks for WPA and WEP, automated hash cracking, Bluetooth hacking, and much more.
I recommend you my alfa adapter: Alfa AWUS036ACM, which works really great with both, 2.4 and 5 Ghz
Tested and...
VPN Overall Reconnaissance, Testing, Enumeration and Exploitation Toolkit
Overview
A very simple Python framework, inspired by SprayingToolkit, that tries to automate most of the process required to detect, enumerate and attack common O365 and VPN endpoints (like Cisco, Citrix, Fortinet...
A Post exploitation tool written in C# uses either CIM or WMI to query remote systems.
Introduction
SharpStrike is a C# rewrite and expansion on @Matt_Grandy_'s CIMplant and @christruncer's WMImplant.
SharpStrike allows you to gather data about a remote system, execute commands, exfil data...
RomBuster is a router exploitation tool that allows to disclosure network router admin password.
Features
Exploits vulnerabilities in most popular routers such as D-Link, Zyxel, TP-Link and Huawei.
Optimized to exploit multiple routers at one time from list.
Simple CLI and API...
Offensive Software Exploitation (OSE) Course
This repository is for the Offensive Software Exploitation Course I am teaching at Champlain College and currently doing it for free online (check the YouTube channel for the recordings). Most of the slide notes I used are already shared on HTID...
BlackMamba
BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework.
Some of BlackMamba features are:
Multi-Client – Supports multiple client connections at the same time.
Real-Time Communication Updates –...
BlackMamba
BlackMamba is a multi-client C2/post-exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework.
Some of BlackMamba features are:
Multi-Client – Supports multiple client connections at the same time.
Real-Time Communication Updates –...
BlackMamba
BlackMamba is a multi-client C2/post exploitation framework with some spyware features. Powered by Python 3.8.6 and QT Framework.
Some of BlackMamba features are:
Multi-Client – Supports multiple client connections at the same time.
Real-Time Communication Updates –...
A high performance FortiGate SSL-VPN vulnerability scanning and exploitation tool.
Requirements
Tested with Parrot & Debian Operating Systems and Windows 10
Hidden content
SHAD0W is a modular C2 framework designed to successfully operate in mature environments.
It will use a range of methods to evade EDR and AV while allowing the operator to continue using tooling tradecraft they are familiar with. It’s powered by Python 3.8 and C, using Donut for payload...
Pown
Pown.js is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like Metasploit, Pown.js considers frameworks to be an anti-pattern. Therefore, each module in Pown is, in fact, a standalone NPM module allowing a greater degree of...
Break out the Box (BOtB)
BOtB is a container analysis and exploitation tool designed to be used by pentesters and engineers while also being CI/CD friendly with common CI/CD technologies.
What does it do?
BOtB is a CLI tool which allows you to:
Exploit common container vulnerabilities...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.