Automated HTTP Enumeration Tool
Posted by Mohit Kumar at Friday, February 15, 2013
Server Shield v1.0.2 - Protect your Linux machine in 1 minute
- Firewall Hardening
- TCP Hardening
- Data Leakage Protection
- ICMP/Ping Flood Protection
- Rootkit Protection
- DoS Protection
- Spoof Protection
- Bogus TCP Protection
- SYN Flood Protection
- Requires
- iptables ("yum install iptables")
Posted by Mohit Kumar at Sunday, October 14, 2012
WordPress Version Checker - MD5 Hash Method
You can download the Script from Pastebin: http://pastebin.com/3c72K1kj
Posted by Mohit Kumar at Tuesday, October 02, 2012
Antiflood v-1.8.2 with IP tables bash script
Posted by Mohit Kumar at Tuesday, October 02, 2012
Windows PowerShell V3.0 download available
- Windows 7 Service Pack 1 (32-bit & 64-bit)
- Windows Server 2008 R2 Service Pack 1 (64-bit only, includes Server Core)
- Windows Server 2008 Service Pack 2 (32-bit & 64-bit)
- Workflow : Windows PowerShell Workflow lets IT Pros and developers apply the benefits of workflows to the automation capabilities of Windows PowerShell. Workflows allow administrators to run long-running tasks (which can be made repeatable, frequent, parallelizable, interruptible, or restart-able) that can affect multiple managed computers or devices at the same time.
- Disconnected Sessions: PowerShell sessions can be disconnected from the remote computer and reconnected later from the same computer or a different computer without losing state or causing running commands to fail.
- Robust Session Connectivity: Remote sessions are resilient to network failures and will attempt to reconnect for several minutes. If connectivity cannot be reestablished, the session will automatically disconnect itself so that it can be reconnected when network connectivity is restored.
- Scheduled Jobs: scheduled jobs that run regularly or in response to an event.
- Delegated Administration: Commands that can be executed with a delegated set of credentials so users with limited permissions can run critical jobs
- Simplified Language Syntax: Simplified language syntax that make commands and scripts look a lot less like code and a lot more like natural language.
- Cmdlet Discovery: Improved cmdlet discovery and automatic module loading that make it easier to find and run any of the cmdlets installed on your computer.
- Show-Command: Show-Command, a cmdlet and ISE Add-On that helps users find the right cmdlet, view its parameters in a dialog box, and run it.
Posted by Mohit Kumar at Thursday, September 20, 2012
pWeb-suite v1.1 - Web application penetration testing
- Hellfire - LFI Automation Tool,
- LogInjector – Code Injection Tool for Web Server Logs (LFI Attack)
- Smsi (SimplyMySQLi) - Simple Mysql Injector
- Xss Tools like StrEncode
- Xss String Encoding Tool.
Posted by Mohit Kumar at Friday, September 07, 2012
Sptoolkit - A Simple Phishing Toolkit
- Apache,
- PHP
- MySQL
- Vast improvements in the editing functionality for templates and education packages. Major changes include: two different editors to choose from (the oroginal spt text editor and TinyMCE), copy templates or education to new version and then customize them.
- Added education completion tracking, now you can determine if your targets completed the assigned education in a campaign.
- Support for the Google and TinyURL URL shortener services. Now your phishing emails can have shortened URLs, making them harder to detect.
- Support for sending SMTP using SSL secured connections.
- Enhancements to the viewing of campiang information including SMTP relay used and destination URL used.
- Initial support for using spt in SSL/TLS secured installations, code updates to prevent insecure content warnings.
- All forms now generate inline errors with entered value retention, allowing easy correction of incorrect or missing items without requiring all information to be entered again.
- Email tracking times are now more accurate when viewing campaign information.
- Most items in the Quick Start module now feature links allowing you to quickly access the desired location in the spt UI.
- Enhancements to the browser detection script for more information on what you need vs. what you have.
- Many security and usability issues fixed.
- Additional improvements in authentication and session management security.
Posted by Mohit Kumar at Friday, August 31, 2012
lafuzz - Local File Incursion exploiter
Posted by Mohit Kumar at Friday, August 31, 2012
OWASP Security Shepherd 1.2 Released
- SQL Injection
- Cross Site Scripting
- Broken Authetication and Session Management
- Cross Site Rrequest Forgery
- Insecure Direct Object Reference
- Insecure Cryptographic Storage
- Failure to Restrict URL Access
- Unvalidated Redirects and Forwards
- Insufficient Transport Layer Security
Posted by Mohit Kumar at Friday, August 31, 2012
Phemail.py: Phishing EMail Social Engineering Tool
- Find corporate email addresses: Phemail has an option for harvesting corporate email addresses and save them to a file. Phemail.py leverages Google to search for LinkedIn specific corporate e-mail targets.
- Create a phishing email template: You get to create your own custom phishing templates. Do not forget to add the string “{0}” in each URL as the script will replace this string with the correct URL automatically.
- Host/upload a single PHP file: This file contains JavaScript code which attempts to collect web browser information and save it in a log file in /tmp directory.
- Run the php file as shown in the following example: # phemail.py -e test-emails.txt -f "Tax report " -r "Tax Report " -s "Important information about your tax" -b body.txt -w http://YOUR-WEBSITE.com
Posted by Mohit Kumar at Thursday, August 16, 2012
HTExploit : Open Source Tool to Bypass Standard Directory Protection
- Multiples modules to execute.
- Save the output to an specify directory.
- HTML Reporting.
- Use multiples wordlist to probe against htaccess bypassing.
- Mode verbose for a full detailed information.
- Multi-platform and flexible.
Posted by Mohit Kumar at Saturday, August 04, 2012
BBQSQL : Blind SQL injection framework ( Python )
- URL
- HTTP Method
- Headers
- Cookies
- Encoding methods
- Redirect behavior
- Files
- HTTP Auth
- Proxies
Posted by Mohit Kumar at Friday, August 03, 2012
Anonymous FTP Scanner - Python Script
Posted by Mohit Kumar at Sunday, July 22, 2012
RemoteScript - Execute scripts on multiple remote hosts
Features
- Execute shell script on single or multiple linux hosts remotely
- Group hosts to execute scripts on multiple hosts simultaneously
- Keep a trace of stout and error output
Posted by Mohit Kumar at Friday, July 20, 2012
Sensitive Buster v 1.0 - Tool to find out Sensitive Data
Usage:
1-first You Must Install Active Python
2-Open Command Prompt
3-./sensitivebuster.py
There are 5 Mode In This Version The Mode it
-shell
-backup
-admin
-dir
-files
4-./sensitivebuster http://example.com -m backup -p
5-./sensitivebuster http://example.com -m backup -p 127.0.0.1:8080
Password : r00tw0rm.com
Posted by Mohit Kumar at Wednesday, July 18, 2012
TheHarvester v 2.0 - Collects email accounts, usernames and hostnames
- Google - emails,subdomains/hostnames
- Google profiles - Employee names
- Bing search - emails, subdomains/hostnames,virtual hosts
- Pgp servers - emails, subdomains/hostnames
- Linkedin - Employee names
- Exalead - emails,subdomain/hostnames
- Searching emails accounts for the domain microsoft.com, it will work with the first 500 google results.
- Searching emails accounts for the domain microsoft.com in a PGP server, here it's not necessary to specify the limit.
Searching for user names that works in the company microsoft, we use google as search engine, so we need to specify the limit of results we want to use:
- Searching in all sources at the same time, with a limit of 200 results:
Posted by Mohit Kumar at Friday, July 06, 2012
Plecost 0.2.2-9-beta : Wordpress fingerprinting tool
Threads version Usage:
Posted by Mohit Kumar at Friday, July 06, 2012
Mutillidae 2.1.20 - Test your Hacking skills
- Changed some color schemes
- Bug fix: The html5 key validation on the on the html5 page was too restrictive. The validator was throwing errors even when the input was ok. This validation checks for any non-alphanumeric characters and prints an error if non-alphanumeric characters are found. This error message contains the bad key the user input. Since the site fails to output encode this error message, it is possible to perform DOM injection.
- Add the html5-storage.php to the vulnerabilities listing.
Posted by Mohit Kumar at Friday, June 29, 2012
NinjaWPass - Protect WordPress against keyloggers and stolen passwords
At the WordPress login prompt, besides your current password, you will be asked to enter 3 randomly chosen characters from your NinjaWPass password. Whether your computer is infected by a keylogger or someone is spying over your shoulder, this protection will keep them away.
Additionally, the plugin offers the possibility to receive an alert by email whenever someone logs into your WordPress admin interface
Posted by Mohit Kumar at Wednesday, June 27, 2012
Bash Script to Automate browser-in-the-middle attack
- - uses ettercap to launch a man in the middle attack
- - ettercap modifies traffic so evil javascript or iframes are added
- - victim's browser will be redirect to the attackers webserver
- - the webserver will be running the msf autopwn module or the beEF framework to launch browser exploits are other browser related attacks.
Posted by Mohit Kumar at Wednesday, June 27, 2012