Category: Exploitation Tools

0

Yersinia

  Yersinia Package Description Yersinia is a framework for performing layer 2 attacks. It is designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for...

0

THC-IPV6

  THC-IPV6 Package Description A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. Source: https://www.thc.org/thc-ipv6/ | Author: The Hacker’s Choice...

0

sqlmap

  sqlmap Package Description sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful...

0

ShellNoob

  shellnoob Package Description Writing shellcodes has always been super fun, but some parts are extremely boring and error prone. Focus only on the fun part, and use ShellNoob! Features: convert shellcode between different...

0

SET

  SET Package Description The Social-Engineer Toolkit is an open-source penetration testing framework designed for Social-Engineering. SET has a number of custom attack vectors that allow you to make a believable attack in a...

0

Maltego Teeth

  Maltego Teeth Package Description Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates. Maltego’s unique advantage is to demonstrate the complexity...

0

Linux Exploit Suggester

  Linux Exploit Suggester Linux Exploit Suggester Package Description As the name suggests, this is a Linux Exploit Suggester, with no frills and no fancy features; just a simple script to keep track of...

0

jboss-autopwn

  jboss-autopwn Package Description This JBoss script deploys a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capability to provide an interactive session. Features...

0

crackle

  crackle Package Description crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data...

0

Commix

  Commix Package Description Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the...