The Social-Engineer Toolkit (SET) v4.7 released
- removed a prompt that would come up when using the powershell injection technique, port.options is now written in prep.py versus a second prompt with information that was already provided
- began an extremely large project of centralizing the SET config file by moving all of the options to the set.options file under src/program_junk
- moved all port.options to the central routine file set.options
- moved all ipaddr.file to the central routine file set.options
- changed spacing on when launching the SET web server
- changed the wording to reflect what operating systems this was tested on versus browsers
- removed an un-needed print option1 within smtp_web that was reflecting a message back to user
- added the updated java bean jmx exploit that was updated in Metasploit
- added ability to specify a username list for the SQL brute forcing, can either specify sa, other usernames, or a filename with usernames in it
- added new feature called multi-powershell-injection – configurable in the set config options, allows you to use powershell to do multiple injection points and ports. Useful in egress situations where you don’t know which port will be allowed outbound.
- enabled multi-pyinjection through java applet attack vector, it is configured through set config
- removed check for static powershell commands, will load regardless – if not installed user will not know regardless – better if path variables aren’t the same
- fixed a bug that would cause linux and osx payloads to be selected even when disabled
- fixed a bug that would cause the meta_config file to be empty if selecting powershell injection
- added automatic check for Kali Linux to detect the default moved Metasploit path
- removed a tail comma from the new multi injector which was causing it to error out
- added new core routine check_ports(filename, ports) which will do a compare to see if a file already contains a metasploit LPORT (removes duplicates)
- added new check to remove duplicates into multi powershell injection
- made the new powershell injection technique compliant with the multi pyinjector – both payloads work together now
- added encrypted and obfsucated jar files to SET, will automatically push new repos to git everyday.
- rewrote the java jar file to handle multiple powershell alphanumeric shellcode points injected into applet.
- added signed and unsigned jar files to the java applet attack vector
- removed create_payload.py from saving files in src/html and instead in the proper folders src/program_junk
- fixed a payload duplication issue in create_payload.py, will now check to see if port is there
- removed a pefile check unless backdoored executable is in use
- turned digital signature stealing from a pefile to off in the set_config file
- converted all src/html/msf.exe to src/program_junk/ and fixed an issue where the applet would not load properly
git clone https://github.com/trustedsec/social-engineer-toolkit/ set/
Posted by Mohit Kumar at Friday, March 15, 2013
Biggest password cracking wordlist with millions of words
Posted by Mohit Kumar at Sunday, March 10, 2013
Phrozen Keylogger Lite v1.0 download
Download Phrozen Keylogger Lite v1.0
Posted by Mohit Kumar at Saturday, March 09, 2013
Pentoo 2013.0 RC1.1 Released
- Changes saving
- CUDA/OpenCL Enhanced cracking software
- John the ripper
- Hashcat Suite of tools
- Kernel 3.7.5 and all needed patches for injection
- XFCE 4.10
- All the latest tools and a responsive development team!
- Hardened Kernel with aufs patches
- Backported Wifi stack from latest stable kernel release
- Module loading support ala slax
- Changes saving on usb stick
- XFCE4 wm
- Cuda/OPENCL cracking support with development tools
- System updates if you got it finally installed
Posted by Mohit Kumar at Saturday, March 09, 2013
Recon-ng : Web Reconnaisance framework for Penetration testers
Posted by Mohit Kumar at Sunday, February 17, 2013
WAppEx v2.0 : Web Application exploitation Tool
Updates in 2.0
- Auto-detect feature deleted from exploits
- Browser tool deleted
- Exploits and payloads view changed
- Exploit Database with the following features added:
- New script syntax and structure
- Searching, selecting, and executing of exploits.
- Add/remove database entries (exploits or payloads)
- Add exploits or payloads to the database using either the Exploit Wizard or the script file
- Batch testing of multiple targets against multiple exploits
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Following tools added:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Local File Inclusion analyzer script updated
- 24 new payloads for LFI, RFI, and PHP Code Execution vulnerabilities added:
- Directory Explorer
- CodeExec Bind
- 3 connect-back shells
- Code Execution
- MySQL Dump
- ServerInfo
- 4 command execution payloads
- Bug-fixes:
- Find Login Page crashed on start
- Problem with software registration
- Stop button did not work when retrieving data from SQL server
- Problem with saving SQL results
- Crashed when closing Find Login Page
- Status icons were not displayed properly in exploit tabs
- An exploit database covering a wide range of vulnerabilities.
- A set of tools useful for penetration testing:
- Manual Request
- Dork Finder
- Exploit Editor
- Hidden File Checker
- Neighbor Site Finder
- Find Login Page
- Online Hash Cracker
- Encoder/Decoder
- Execute multiple instances of one or more exploits simultaneously.
- Execute multiple instances of one or more payloads (for every running exploit) simultaneously.
- Test a list of target URL’s against a number of selected exploits.
- Allows you to create your own exploits and payloads and share them online.
- A number of featured exploits (6) and payloads (39) bundled within the software exploit database:
- Testing and exploiting of Local File Inclusion vulnerabilities
- Testing and exploiting of Local File Disclosure vulnerabilities
- Testing and exploiting of Remote File Inclusion vulnerabilities
- Testing and exploiting of SQL Injection vulnerabilities
- Testing and exploiting of Remote Command Execution Inclusion vulnerabilities
- Testing and exploiting of Server-side Code Injection vulnerabilities
Posted by Mohit Kumar at Friday, February 15, 2013
Password Cracker Tool Hashkill version 0.3.1 released
Posted by Mohit Kumar at Friday, February 15, 2013
Weevely : Stealth PHP web shell with telnet style console
- More than 30 modules to automatize administration and post exploitation tasks:
- Execute commands and browse remote filesystem, even with PHP security restriction
- Audit common server misconfigurations
- Run SQL console pivoting on target machine
- Proxy your HTTP traffic through target
- Mount target filesystem to local mount point
- Simple file transfer from and to target
- Spawn reverse and direct TCP shells
- Bruteforce SQL accounts through target system
- Run port scans from target machine
- And so on..
- Backdoor communications are hidden in HTTP Cookies
- Communications are obfuscated to bypass NIDS signature detection
- Backdoor polymorphic PHP code is obfuscated to avoid HIDS AV detection
Posted by Mohit Kumar at Friday, February 15, 2013
Automated HTTP Enumeration Tool
Posted by Mohit Kumar at Friday, February 15, 2013
BlindElephant – Web Application Fingerprinting
The BlindElephant Web Application Finger-printer attempts to discover the version of a (known) web application by comparing static files at known locations against precomputed hashes for versions of those files in all all available releases. The technique is fast, low-bandwidth, non-invasive, generic, and highly automatically.
Posted by Mohit Kumar at Friday, February 15, 2013
PwnStar latest version with new Exploits released
- “hotspot_3″ is a simple phishing web page, used with basic menu option 4.
- “portal_simple” is a captive portal which allows you to edit the index.html with the name of the portal eg “Joe’s CyberCafe”. It is used for sniffing.
- “portal_hotspot3″ phishes credentials, and then allows clients through the portal to the internet
- “portal_pdf” forces the client to download a malicious pdf in order to pass through the portal
- captive-portal with iptables and php
- more php scripts added
- exploits added
- mdk3 and airdrop deauth
- manage interfaces and MACspoofing
- set up sniffing
- serve up phishing or malicious web pages
- launch karmetasploit
- grab WPA handshakes
- de-auth clients
- manage IPtables
Posted by Mohit Kumar at Saturday, November 10, 2012
PwnPi v2.0 - A Pen Test Drop Box distro for the Raspberry Pi
Login username and password is root:root
Tools List:
Download Here
Posted by Mohit Kumar at Saturday, November 10, 2012
NetSleuth : Open source Network Forensics And Analysis Tools
NetSleuth is an opensource network forensics and analysis tool, designed for triage in incident response situations. It can identify and fingerprint network hosts and devices from pcap files captured from Ethernet or WiFi data (from tools like Kismet).
- An easy realtime overview of what devices and what people are connected to any WiFi or Ethernet network.
- Free. The tool can be downloaded for free, and the source code is available under the GPL.
- Simple and cost effective. No requirement for hardware or reconfiguration of networks.
- “Silent portscanning” and undetectable network monitoring on WiFi and wired networks.
- Automatic identification of a vast array of device types, including smartphones, tablets, gaming consoles, printers, routers, desktops and more.
- Offline analysis of pcap files, from tools like Kismet or tcpdump, to aid in intrusion response and network forensics.
Posted by Mohit Kumar at Saturday, November 10, 2012
TXDNS v 2.2.1 - Aggressive multithreaded DNS digger
New features:
- Support AAAA(IPv6)record queries:
- -rr AAAA;
- Rewrite summarizing statistics using a thread-safe algorithm instead mutex.
Bug fixes:
- Fixed a problem when running under Windows XP;
- Fixed a problem when parsing a IPv6 address.
- November 9th, 2012 by Arley Silveira
Posted by Mohit Kumar at Saturday, November 10, 2012
PySQLi - Python SQL injection framework
Posted by Mohit Kumar at Sunday, November 04, 2012
Joomscan updated - now can identify 673 joomla vulnerabilities
Posted by Mohit Kumar at Saturday, November 03, 2012
BeEF 0.4.3.8 - Browser Exploitation Framework
Posted by Mohit Kumar at Saturday, November 03, 2012
Spooftooph 0.5.2 - Automated spoofing or cloning Bluetooth device
Features
- Clone and log Bluetooth device information
- Generate a random new Bluetooth profile
- Change Bluetooth profile every X seconds
- Specify device information for Bluetooth interface
- Select device to clone from scan log
1) Specify NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -n new_name -a 00:11:22:33:44:55 -c 0x1c010c
2) Randomly generate NAME, CLASS and ADDR.
root@thnlab: spooftooph -i hci0 -R
3) Scan for devices in range and select device to clone. Optionally dump the device information in a specified log file.
root@thnlab: spooftooph -i hci0 -s -w file.csv
4) Load in device info from log file and specify device info to clone.
root@thnlab: spooftooph -i hci0 -r file.csv
5) Clone a random devices info in range every X seconds.
root@thnlab: spooftooph -i hci0 -t 10
Download Spooftooph 0.5.2
Posted by Mohit Kumar at Saturday, November 03, 2012
Wifi Honey - Creates fake APs using all encryption
Installing wifi honey
chmod a+x wifi_honey.sh
./wifi_honey.sh fake_wpa_net
./wifi_honey.sh fake_wpa_net 1 waln1
Download Wifi Honey
Posted by Mohit Kumar at Saturday, November 03, 2012
JBoss Autopwn - JSP Hacking Tool For JBoss AS Server
Posted by Mohit Kumar at Saturday, November 03, 2012