Cyborg Hawk Linux is a Ubuntu (Linux) based Penetration Testing Linux
Distro developed and designed for ethical hackers and penetration
testers. Cyborg Hawk Distro can be used for network security and
assessment and also for digital forensics. It also has various tools
suited to the testing of Mobile Security and Wireless infrastructure.
It’s a good start and I hope the developers will keep working on it
and rope in some higher level security engineers to work on the OS
optimization and driver stack.
NULL-BIT.COM
THE ETHICAL HACKING AND CYBER SECURITY AWARENESS SITE
LaZagne – Password Recovery Tool For Windows & Linux
Aircrack-ng GUI - The WiFi Hacking Tool For Windows
Aircrack-ng is a complete suite of tools to assess WiFi network security.
It focuses on different areas of WiFi securiy:
It focuses on different areas of WiFi securiy:
- Monitoring: Packet capture and export of data to text files for further processing by third party tools.
- Attacking: Replay attacks, deauthentication, fake access points and others via packet injection.
- Testing: Checking WiFi cards and driver capabilities (capture and injection).
- Cracking: WEP and WPA PSK (WPA 1 and 2).
Windows Exploit Suggester Tool
This tool
compares a targets patch levels against the Microsoft vulnerability
database in order to detect potential missing patches on the target. It
also notifies the user if there are public exploits and Metasploit
modules available for the missing bulletins.
It requires the 'systeminfo' command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.
It requires the 'systeminfo' command output from a Windows host in order to compare that the Microsoft security bulletin database and determine the patch level of the host.
The Penetration Testers Framework (PTF)
The PenTesters Framework (PTF) is a Python script designed for
Debian/Ubuntu/ArchLinux based distributions to create a similar and
familiar distribution for Penetration Testing. As pentesters, we've been
accustom to the /pentest/ directories or our own toolsets that we want
to keep up-to-date all of the time. We have those "go to" tools that we
use on a regular basis, and using the latest and greatest is important.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine.
PTF attempts to install all of your penetration testing tools (latest and greatest), compile them, build them, and make it so that you can install/update your distribution on any machine.
Grand Theft Auto 5 - Torrent File
Grand Theft Auto 5 is an open world, action-adventure video game developed by Rockstar North and published by Rockstar Games.
Bluto - DNS Recon, DNS Zone Transfer, and Email Enumeration Tool
The target domain is queried for MX and NS records. Sub-domains are
passively gathered via NetCraft. The target domain NS records are each
queried for potential Zone Transfers. If none of them gives up their
spinach, Bluto will brute force subdomains using parallel sub processing
on the top 20000 of the 'The Alexa Top 1 Million subdomains'. NetCraft
results are presented individually and are then compared to the brute
force results, any duplications are removed and particularly interesting
results are highlighted.
Recon-ng - Full-Featured Web Reconnaissance Framework
Recon-ng is a full-featured Web Reconnaissance framework written in
Python. Complete with independent modules, database interaction, built
in convenience functions, interactive help, and command completion,
Recon-ng provides a powerful environment in which open source web-based
reconnaissance can be conducted quickly and thoroughly.
WiFi-Pumpkin - Framework For Rogue Wi-Fi AP Attack
WiFi-Pumpkin is security tool that provide the Rogue access point to
Man-In-The-Middle and network attacks. purporting to provide wireless
Internet services, but snooping on the traffic. can be used to capture
of credentials of unsuspecting users by either snooping the
communication by phishing.
Subscribe to:
Posts (Atom)