Profile cover photo
Profile photo
Effect Hacking
580 followers -
Learn to Hack and Protect
Learn to Hack and Protect

580 followers
About
Posts

Post has attachment
GDB Dashboard - Modular Visual Interface for GDB in Python
A modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during the program execution. Its main goal is to reduce the ...
Add a comment...

Post has attachment
XXEinjector - Tool for Automatic Exploitation of XXE Vulnerability Using Direct and Different Out of Band Methods
XXEinjector automates retrieving files using direct and out of band methods. Directory listing only works in Java applications. Bruteforcing method needs to be used for other applications. Options: --host Mandatory - our IP address for reverse connectio...
Add a comment...

Post has attachment
Viper - Bruteforce Password Cracker
Viper is a UNIX-style bruteforce password cracker for passwords encrypted with crypt. It has been developed from Hale's viper 1.4 Perl program. It runs under Linux, Solaris, HPUX and DOS/Windows. Usage: Viper v1.6 (Hale 05/12/2000) - C version by Frank4DD (...
Add a comment...

Post has attachment
Windows Exploit Suggester - Tool To Detect Potential Missing Patches & Find Exploits
Windows Exploit Suggester is a Python-based tool that compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metaspl...
Add a comment...

Post has attachment
p0wnedShell - PowerShell Runspace Post Exploitation Toolkit
p0wnedShell is an offensive PowerShell host application written in C# that does not rely on powershell.exe but runs powershell commands and functions within a powershell runspace environment (.NET). It has a lot of offensive PowerShell modules and binaries ...
Add a comment...

Post has attachment
dnstwist - Domain Name Permutation Engine for Detecting Typo Squatting, Phishing and Corporate Espionage
dnstwist is a Python-based tool that can help you see what sort of trouble users can get in trying to type your domain name. It can find similar-looking domains that adversaries can use to attack you. It can also detect typosquatters, phishing attacks, frau...
Add a comment...

Post has attachment
Zizzania - Automated DeAuth Attack
Zizzania sniffs wireless traffic listening for WPA handshakes and dumping only those frames suitable to be decrypted (one beacon + EAPOL frames + data). In order to speed up the process, Zizzania sends IEEE 802.11 DeAuth frames to the stations whose handsha...
Add a comment...

Post has attachment
JShielder - Hardening Script for Linux Servers/ Secure LAMP-LEMP Deployer
JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a ...
Add a comment...

Post has attachment
SimplyEmail - Email Recon Made Fast and Easy, With a Framework To Build On
SimplyEmail is a tool that is based on the work of theHarvester and kind of a port of the functionality. This is just an expansion of what was used to build theHarvester and will incorporate his work but allow users to easily build Modules for the Framework...
Add a comment...

Post has attachment
RootHelper - A Bash Script that Downloads and Unzips Scripts that will Aid with Privilege Escalation on a Linux System
Roothelper will aid in the process of privilege escalation on a Linux system that has been compromised, by fetching a number of enumeration and exploit suggestion scripts. The latest version downloads five scripts. Two enumeration shellscripts, one informat...
Add a comment...
Wait while more posts are being loaded