Vicgmac

196 Flips | 2 Magazines | 14 Likes | 1 Following | 340 Followers | @Vicgmac | Keep up with Vicgmac on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Vicgmac”

Windows RDP flaw: 'Install Microsoft's patch, turn on your firewall'

Attackers can use a protocol bug in Windows RDP to steal session authentication and take over a network domain.<p>Microsoft's Patch Tuesday updates for …

Information Security

CMSsc4n - Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop

Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop.<b><br>Use</b><b><br>Download CMSsc4n</b>

Sublist3r v1.0 - Fast subdomains enumeration tool for penetration testers

Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather …

EmbedInHTML - Embed and hide any file in an HTML file

What this tool does is taking a file (<i>any type of file</i>), encrypt it, and embed it into an HTML file as ressource, along with an automatic download …

RDPY – RDP Security Tool For Hacking Remote Desktop Protocol

RDPY is an RDP Security Tool in Twisted Python with RDP Man in the Middle proxy support which can record sessions and Honeypot functionality.RDPY is …

Trape - People tracker on the Internet (The evolution of phishing attacks) OSINT

Trape is a recognition tool that allows you to <b>track people</b>, the information you can get is very detailed. We want to teach the world through this, as …

wig - WebApp Information Gatherer

wig is a web application information gathering tool, which can identify numerous Content Management Systems and other administrative applications.The …

BoopSuite - A Suite of Tools for Wireless Auditing and Security Testing

BoopSuite is an up and coming suite of wireless tools designed to be easy to use and powerful in scope, that support both the 2 and 5 GHz spectrums. …

Pentmenu - A simple Bash Script for Recon and DOS Attacks

<b> A bash script inspired by pentbox.</b> Designed to be a simple way to implement various network pentesting functions, including network attacks, using …

Comission - WhiteBox CMS Analysis

CoMisSion is a tool to quickly analyze a CMS setup. The tool:<br>• checks for the core version;<br>• looks for the last core version;<br>• looks for vulnerabilities in …

Breacher - Tool To Find Admin Login Pages And EAR Vulnerabilites

A script to find admin login pages and EAR vulnerabilites.<b><br>Features</b><br>• Multi-threading on demand<br>• Big path list (798 paths)<br>• Supports php, asp and html …

BBQSQL - A Blind SQL Injection Exploitation Tool

Blind SQL injection can be a pain to exploit. When the available tools work they work well, but when they don't you have to write something custom. …

NETATTACK 2 - An Advanced Wireless Network Scan and Attack Script

NETATTACK 2 is a python script that scans and attacks local and wireless networks. Everything is super easy because of the GUI that makes it …

Vision2 - Nmap's XML result parse and NVD's CPE correlation to search CVE

Nmap's XML result parse and NVD's CPE correlation to search CVE. You can use that to find public vulnerabilities in services...<b><br>Example of</b> …

Spaghetti Download – Web Application Security Scanner

Spaghetti is an Open-source Web Application Security Scanner, it is designed to find various default and insecure files, configurations, and …

Seccubus - Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan …

CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation

CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including …

EllaScanner - Passive Web Scanner

Passive web scanner.<br>EllaScanner is a simple passive web scanner. Using this tool you can simply check your site’s security state.<b></b><b><br>Scanning of the site</b> …

changeme - A Default Credential Scanner

A default credential scanner.<b><br>About</b><br>Getting default credentials added to commercial scanners is often difficult and slow. changeme is designed to be …

Linux

Blazy - Modern Login Bruteforcer Which Also Tests For CSRF, Clickjacking, Cloudflare and WAF

Blazy is a modern login page bruteforcer.<b><br>Features</b><br>• Easy target selections<br>• Smart form and error detection<br>• CSRF and Clickjacking Scanner<br>• Cloudflare and WAF …

pymultitor - Python Multi Threaded Tor Proxy

<b> Did you ever want to be at two different places at the same time?</b><br>While performing penetration tests there are often problems caused by security …

Parents Can’t Believe Their Eyes After Seeing What Their 2-Year-Old Twins Do At Night

Few moments are more satisfying for parents than the moment you successfully put your children to bed. Only then can you put your feet up, safe in …

Cyber Probe - Capturing, Analysing and Responding to Cyber Attacks

Cyberprobe is a distributed software architecture for monitoring of networks against attack. It consists of two components: cyberprobe, which …

credmap v0.1 - The Credential Mapper

Credmap is an open source tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user …

autovpn - Easily connect to a VPN in a country of your choice

autovpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you to a server obtained from …

HERCULES - A Special Payload Generator That Can Bypass Antivirus Softwares

HERCULES is a customizable payload generator that can bypass antivirus software. <b> <br>INSTALLATTION</b> <br>SUPPORTED PLATFORMS:<br>Operative systemVersionUbuntu16.04 …

brut3k1t - Server-side Brute-force Module (ssh, ftp, smtp, facebook, and more)

Server-side brute-force module. Brute-force (dictionary attack, jk) attack that supports multiple protocols and services. <b> <br>1. Introduction</b> <b> <br>brut3k1t</b> is …

Brutal - Toolkit to quickly create various Payload, PowerShell Attack, Virus Attack and Launch Listener for a HID

Brutal is extremely useful for executing scripts on a target machine without the need for human-to-keyboard interaction ( HID -ATTACK ) .When you …

MorphAES - IDPS & SandBox & AntiVirus STEALTH KILLER

MorphAES is the world's first polymorphic shellcode/malware engine, with metamorphic properties and capability to bypass sandboxes, which makes it …

WinPirate - Automated Sticky Keys Hack. Post Exploitation It Grabs Browser Passwords, History, And Network Passwords

Here's the plan. We create a way to automate doing the sticky keys windows hack from a bootable USB.<br>Then, we automate getting as many saved passwords …