Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux
Distro developed and designed for ethical hackers and penetration
testers. Cyborg Hawk Distro can be used for network security and
assessment and also for digital forensics. It also has various tools
suited to the testing of Mobile Security and Wireless infrastructure.
It’s a good start and I hope the developers will keep working on it
and rope in some higher level security engineers to work on the OS
optimization and driver stack.
Showing posts with label HackingTool. Show all posts
Showing posts with label HackingTool. Show all posts
LaZagne – Password Recovery Tool For Windows & Linux
Aircrack-ng GUI - The WiFi Hacking Tool For Windows
Aircrack-ng is a complete suite of tools to assess WiFi network security.
It focuses on different areas of WiFi securiy:
It focuses on different areas of WiFi securiy:
- Monitoring: Packet capture and export of data to text files for further processing by third party tools.
- Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
- Testing: Checking WiFi cards and driver capabilities (capture and injection).
- Cracking: WEP and WPA PSK (WPA 1 and 2).
Windows Exploit Suggester Tool
This tool
compares a targets patch levels against the Microsoft vulnerability
database in order to detect potential missing patches on the target. It
also notifies the user if there are public exploits and Metasploit
modules available for the missing bulletins.
It requires the 'systeminfo' command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.
It requires the 'systeminfo' command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.
The Penetration Testers Framework (PTF)
The PenTesters Framework (PTF) is a Python script designed for
Debian/Ubuntu/ArchLinux based distributions to create a similar and
familiar distribution for Penetration Testing. As pentesters, we've been
accustom to the /pentest/ directories or our own toolsets that we want
to keep up-to-date all of the time. We have those "go to" tools that we
use on a regular basis, and using the latest and greatest is important.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine.
Bluto - DNS Recon, DNS Zone Transfer, and Email Enumeration Tool
The target domain is queried for MX and NS records. Sub-domains are
passively gathered via NetCraft. The target domain NS records are each
queried for potential Zone Transfers. If none of them gives up their
spinach, Bluto will brute force subdomains using parallel sub processing
on the top 20000 of the 'The Alexa Top 1 Million subdomains'. NetCraft
results are presented individually and are then compared to the brute
force results, any duplications are removed and particularly interesting
results are highlighted.
Recon-ng - Full-Featured Web Reconnaissance Framework
Recon-ng is a full-featured Web Reconnaissance framework written in
Python. Complete with independent modules, database interaction, built
in convenience functions, interactive help, and command completion,
Recon-ng provides a powerful environment in which open source web-based
reconnaissance can be conducted quickly and thoroughly.
WiFi-Pumpkin - Framework For Rogue Wi-Fi AP Attack
WiFi-Pumpkin is security tool that provide the Rogue access point to
Man-In-The-Middle and network attacks. purporting to provide wireless
Internet services, but snooping on the traffic. can be used to capture
of credentials of unsuspecting users by either snooping the
communication by phishing.
Venom - Metasploit Shellcode Generator / Compiler / Listenner
The script will use msfvenom (metasploit) to generate shellcode in
diferent formats ( c | python | ruby | dll | msi | hta-psh ), injects
the shellcode generated into one funtion (example: python) "the python
funtion will execute the shellcode in ram" and uses compilers like: gcc
(gnu cross compiler) or mingw32 or pyinstaller to build the executable
file, also starts a multi-handler to recibe the remote connection
(reverse shell or meterpreter session).
Phpsploit - Stealth Post-Exploitation Framework
PhpSploit is a remote control framework, aiming to provide a stealth
interactive shell-like connection over HTTP between client and web server.
It is a post-exploitation tool capable to maintain access to a
compromised web server for privilege escalation purposes.
The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:
<? @eval($_SERVER['HTTP_PHPSPL01T']) ?>
Overview
The obfuscated communication is accomplished using HTTP headers under standard client requests and web server's relative responses, tunneled through a tiny polymorphic backdoor:
<? @eval($_SERVER['HTTP_PHPSPL01T']) ?>
SQLMap - Automatic SQL Injection And Database Hacking Tool
sqlmap is an open source penetration testing tool that automates the
process of detecting and exploiting SQL injection flaws and taking over
of database servers. It comes with a powerful detection engine, many
niche features for the ultimate penetration tester and a broad range of
switches lasting from database fingerprinting, over data fetching from
the database, to accessing the underlying file system and executing
commands on the operating system via out-of-band connections.
ATSCAN v6.2 - Search / Site / Server Scanner
- SEARCH engine
- XSS scanner.
- Sqlmap.
- LFI scanner.
- Filter wordpress and Joomla sites in the server.
- Find Admin page.
Subscribe to:
Posts (Atom)