Recon-ng : Web Reconnaisance framework for Penetration testers
Posted by Mohit Kumar at Sunday, February 17, 2013
ExploitShield Browser Edition - Forget about browser vulnerabilities
Posted by Mohit Kumar at Sunday, November 04, 2012
BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Grinder Version 0.3 released
- Added a Fuzzer tab to allow users to view statistics (bar charts) about the fuzzers that have been run in the system. You can also drill down in to individual fuzzers to view what targets they are generating crashes on. Added bar chart support via jqPlot.
- Added a Settings tab. Moved the user account management features from the System tab into this new Settings tab.
- Add in initial work for automated testcase reduction via .\node\reduction.rb
- Added IE10 support (As seen in Windows 8 Consumer Preview) (grinder\node\browser\internetexplorer.rb).
- Added a --fuzzer parameter to grinder.rb. When bringing up a node you can now specify a single fuzzer to load instead of loading all the fuzzers in the nodes fuzzer directory. Usefull for testing a specific fuzzer (e.g. >ruby grinder.rb --fuzzer=DOMBlaster2000 FF)
- Added a --help and --version parameter to grinder.rb and testcase.rb.
- grinder_logger.dll is now thread safe and can handle log messages of an arbitrary size.
- Changed the server.rb 301 reditect to a 307 temporary redirect.
- Many small bug fixes!
Posted by Mohit Kumar at Tuesday, October 09, 2012
winAUTOPWN v3.2 Released
Posted by Mohit Kumar at Tuesday, October 02, 2012
Rapid7 Tool Checks for MySQL Auth Bypass Vulnerability
Posted by Mohit Kumar at Thursday, September 20, 2012
Social Engineer Toolkit 4.0 Released
The powershell attack vectors now support customized payload selection through the config/set_config. A new attack vector has been added called the Dell DRAC Attack Vector (default credential finder).
Download Social Engineer Toolkit 4.0:
svn co http://svn.trustedsec.com/social_engineering_toolkit set/
Posted by Mohit Kumar at Thursday, September 20, 2012
U3-Pwn : Sandisk Executable Injection Tool
Requirements to Run U3-Pwn
- Metasploit
- U3-Tool
- Python-2.6
Posted by Mohit Kumar at Tuesday, July 10, 2012
Zemra Botnet Download
Zemra uses a simple panel with an overview of all statistics is needed.With the help of two graphs can be seen operating machinery and the region location.In addition, statistics on online and for more information. You have a chance to see everything online Socks5 and export them to the list.Traffic is encrypted and protected using the algorithm AES, each client communicates with a unique generated key.
A brief functional:
• Intuitive control panel
• DDos (HTTP / SYN Flood / UDP)
• Loader (Load and run).
• Cheat visits (visits to the page views).
• USB Spread (spread through flash drives)
• Socks5 (picks up socks proxy on the infected machine)
• Update (Updates the bot)
• [color = red] The process can not be completed because the He is critical.
• 256 Bit AES encryption of traffic from the bot to the server
• Anti-Debugger
• There is a choice of a particular country bots perform the job
Posted by Mohit Kumar at Wednesday, June 27, 2012
Metasploit payload Debian (.deb) package trojan Generator Script
The script will do the following:
- Determine your IP address automatically for the LHOST of the payload.
- Ask if you want a shell or meterpreter
- Ask if you want it reverse connection or Bind port TCP
- Request the Port number.
- at that point it will create two files
- trojan.exe - your virus payload
- msf_Trojan_Listener - a file with a one liner to create the metasploit listener that works with your payload.
- Next it will start msfcli to create a listener.
Posted by Mohit Kumar at Sunday, June 10, 2012
CVE-2012-2122 : Mysql Authentication Bypass Exploit
Posted by Mohit Kumar at Sunday, June 10, 2012
SMB checker and Remote Code Execution Vulnerability Exploiter Script
Posted by Mohit Kumar at Sunday, June 10, 2012
Nessus 5.0.1 - Vulnerability scanner
- Resolved an issue whereas packet forgery was not working on some Windows setups
- Improved the Windows installer which would fail on some setups
- Fixed several thread synchronization issues leading to a crash in certain situations
- Imported v1 reports are more legible
- Nessus can now read a 64-bit database on a 32-bit system and vice-versa
- Identified and resolved a minor memory leak issue occurring on all platforms
- Scanning with a SSL certificate defined in the policy would sometimes cause a scanner crash
- Workaround for CVE-2011-3389
- Worked around a possible incompatibility with the Fedora 16 / Debian 6 memory allocator
- Restored the ability to log in via certificate authentication on port 1241 when “force_pubkey_auth = no“
- This version of Nessus now includes OpenSSL version 1.0.0h
Posted by Mohit Kumar at Friday, June 08, 2012
Webapp-Exploit-Payloads v.1.0 Released
The basic problem solved by any payload is pretty simple: "I have access,what now?". In memory corruption exploits it's pretty easy to perform arbitrary tasks because after successfulexploitation the attacker is able to control the remote CPU and memory, which allow for execution of arbitraryoperating system calls. With this power it‟s possible to create a new user, run arbitrary commands or uploadfiles.
Web Application Payloads are small pieces of code that are run in the intruder‟s box, and then translated bythe Web Application exploit to a combination of GET and POST requests to be sent to the remote Web server
Posted by Mohit Kumar at Friday, June 08, 2012
winAUTOPWN v3.0 - System vulnerability exploitation Framework
Posted by Mohit Kumar at Friday, June 08, 2012