Quantcast
Channel: KitPloit - PenTest & Hacking Tools
Browsing all 212 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Ashok - A OSINT Recon Tool, A.K.A Swiss Army Knife

Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is...

View Article


Image may be NSFW.
Clik here to view.

DockerSpy - DockerSpy Searches For Images On Docker Hub And Extracts...

DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.What is Docker?Docker is an open-source platform that automates the...

View Article


Image may be NSFW.
Clik here to view.

ModTracer - ModTracer Finds Hidden Linux Kernel Rootkits And Then Make...

ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.Another way to make an LKM visible is using the imperius trick: https://github.com/MatheuZSecurity/ImperiusDownload ModTracer

View Article

Image may be NSFW.
Clik here to view.

Psobf - PowerShell Obfuscator

Tool for obfuscating PowerShell scripts written in Go. The main objective of this program is to obfuscate PowerShell code to make its analysis and detection more difficult. The script offers 5 levels...

View Article

Image may be NSFW.
Clik here to view.

BYOSI - Evade EDR's The Simple Way, By Not Touching Any Of The API's They Hook

Evade EDR's the simple way, by not touching any of the API's they hook.TheoryI've noticed that most EDRs fail to scan scripting files, treating them merely as text files. While this might be...

View Article


Image may be NSFW.
Clik here to view.

Imperius - Make An Linux Kernel Rootkit Visible Again

A make an LKM rootkit visible again.This tool is part of research on LKM rootkits that will be launched.It involves getting the memory address of a rootkit's "show_module" function, for example, and...

View Article

Image may be NSFW.
Clik here to view.

Mass-Assigner - Simple Tool Made To Probe For Mass Assignment Vulnerability...

Mass Assigner is a powerful tool designed to identify and exploit mass assignment vulnerabilities in web applications. It achieves this by first retrieving data from a specified request, such as...

View Article

Image may be NSFW.
Clik here to view.

File-Unpumper - Tool That Can Be Used To Trim Useless Things From A PE File...

file-unpumper is a powerful command-line utility designed to clean and analyze Portable Executable (PE) files. It provides a range of features to help developers and security professionals work with PE...

View Article


Image may be NSFW.
Clik here to view.

Damn-Vulnerable-Drone - An Intentionally Vulnerable Drone Hacking Simulator...

The Damn Vulnerable Drone is an intentionally vulnerable drone hacking simulator based on the popular ArduPilot/MAVLink architecture, providing a realistic environment for hands-on drone hacking.About...

View Article


Image may be NSFW.
Clik here to view.

Secator - The Pentester'S Swiss Knife

secator is a task and workflow runner used for security assessments. It supports dozens of well-known security tools and it is designed to improve productivity for pentesters and security...

View Article

Image may be NSFW.
Clik here to view.

PolyDrop - A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload...

BYOSI- Bring-Your-Own-Script-Interpreter- Leveraging the abuse of trusted applications, one is able to deliver a compatible script interpreter for a Windows, Mac, or Linux system as well as malicious...

View Article

Image may be NSFW.
Clik here to view.

SafeLine - Serve As A Reverse Proxy To Protect Your Web Services From Attacks...

SafeLine is a self-hosted WAF(Web Application Firewall) to protect your web apps from attacks and exploits.A web application firewall helps protect web apps by filtering and monitoring HTTP traffic...

View Article
Browsing all 212 articles
Browse latest View live