bucky67gto

860 Flips | 1 Magazine | 3 Likes | 2 Following | 738 Followers | @bucky67gto | Keep up with bucky67gto on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “bucky67gto”

airgeddon - Wireless Security Auditing Script

Airgeddon is a Bash powered multi-use Wireless Security Auditing Script for Linux systems with an extremely extensive feature list.Airgeddon Wireless …

Wireless

One-Lin3r v1.1 - Gives You One-Liners That Aids In Penetration Testing Operations

One-Lin3r is simple and light-weight framework inspired by the web-delivery module in Metasploit.<br>It consists of various one-liners that aids in …

Linux

M4Ngl3M3 - Common Password Pattern Generator Using Strings List

Common password pattern generator using strings list.<b><br>Quick Installation:</b><b><br>Basic Help:</b><b><br>--from-year (-fy), --to-year (-ty):</b><br>Here we set where we want our …

Python Programming

Kerberoast

The process of cracking Kerberos service tickets and rewriting them in order to gain access to the targeted service is called Kerberoast. This is …

Information Security

Hash-Buster v2.0 - Tool Which Uses Several APIs To Perform Hash Lookups

<b>Features</b><br>• Automatic hash type identification<br>• Supports MD5, SHA1, SHA2<br>• Can extract & crack hashes from a file<br>• Can find hashes from a directory, …

Databases

pydictor - A Powerful and Useful Hacker Dictionary Builder for a Brute-Force Attack

<b>pydictor</b> is a powerful and useful hacker dictionary builder for a brute-force attack.<b><br>Why I need to use pydictor ?</b><b></b><b><br>1. it always can help you</b>You can use …

Python Programming

Empire GUI - Empire Client Application

The Empire Multiuser GUI is a graphical interface to the Empire post-exploitation Framework. It was written in Electron and utilizes websockets …

Linux

Sharesniffer - Network Share Sniffer And Auto-Mounter For Crawling Remote File Systems

sharesniffer is a network analysis tool for finding open and closed file shares on your local network. It includes auto-network discovery and …

Linux

Situational Awareness

A common step in the life-cycle of a red team engagement is to gather as much information is possible for the compromised environments and the domain …

Information Security

GyoiThon - A Growing Penetration Test Tool Using Machine Learning

GyoiThon is a <b>growing penetration test tool using Machine Learning</b>.GyoiThon <b>identifies the software installed on web server</b> (OS, Middleware, Framework, …

Machine Learning

Terminator - Metasploit Payload Generator

Terminator Metasploit Payload Generator.<b><br>Payload List :</b><b><br>Binaries Payloads</b><b><br>Scripting Payloads</b><b><br>Web Payloads</b><b><br>Encrypters</b><br>• The author does not hold any …

Forensics

HTTPoxyScan - HTTPoxy Exploit Scanner

PoC/Exploit scanner to scan common CGI files on a target URL for the HTTPoxy vulnerability. Httpoxy is a set of vulnerabilities that affect …

Scanners

Sn1per v4.4 - Automated Pentest Recon Scanner

Sn1per is an automated scanner that can be used during a penetration test to enumerate and scan for vulnerabilities.<b><br>DEMO VIDEO:</b> <b><br>FEATURES:</b><br>• Automatically …

Information Security

Autopwn v2.0 - A Simple Bash Based Metasploit Automation Tool

A simple bash based metasploit automation tool!<p><b>With just a few clicks, own any android or windows device!!</b><p><b>Update:</b><p>Changed the name from Autopreter to …

How To: Use Maltego to Target Company Email Addresses That May Be Vulnerable from Third-Party Breaches

The easiest way around a security policy is to find users who don't follow it. The Have I Been Pwned database identifies accounts with information …

Samurai Email Discovery - Is A Email Discovery Framework That Grabs Emails Via Google Dork, Company Name, Or Domain Name

SED is a email discovery framework created 100% in BASH that grabs emails via google dork, company name, or domain name.<b><br>Requirements</b><br>• apt-install</b> …

GPON - Python Exploit For Remote Code Executuion On GPON Home Routers (CVE-2018-10562)

<b>RCE on GPON home routers (CVE-2018-10561)</b><b><br>Vulnerability</b><br>Many routers today use GPON internet, and a way to bypass all authentication on the devices</b> …

Airbash - Fully Automated WPA PSK Handshake Capture Script

Airbash is a POSIX-compliant, fully automated WPA PSK handshake capture script aimed at penetration testing. It is compatible with Bash and Android …

wifite2: new version of the popular wireless network auditor, "wifite" • Penetration Testing

Wifite 2<p>A complete re-write of wifite, a Python script for auditing wireless networks.<p>What’s new?<p><b>Fewer bugs</b><p>Cleaner process management. Does not leave …

Over 55,000 security camera DVRs are vulnerable to an exploit so simple it fits in a tweet

Last month, Argentinian security researcher Ezequiel Fernandez published CVE-2018-9995, a vulnerability he discovered in dozens of brands of DVR that …

NBNS Spoofing

Netbios Name Service (NBT-NS) is used in Windows networks for communication between hosts. Systems will use this service when resolving names over …

Zoom - Automatic Lightning Fast Wordpress Vulnerability Scanner

Zoom is a lightning fast wordpress vulnerability scanner equipped with subdomain & infinite username enumeration.. It doesn't support plugin & theme …

Wordpress Exploit Framework v1.9.2 - Framework For Developing And Using Modules Which Aid In The Penetration Testing Of WordPress Powered Websites And Systems - KitPloit - PenTest Tools for your Security Arsenal ☣

A Ruby framework for developing and using modules which aid in the penetration testing of WordPress powered websites and systems.<b><br>What do I need to</b> …

The Axer - Tool To Automate The Procedure Of Creating Your Payloads With Msfvenom

The axer will replace the manual procedure of creating your payloads with msfvenom , making it easier and a lot quicker.<b><br>THE AXER WILL LET YOU CHOOSE</b> …

NetRipper – Smart Traffic Sniffing for Penetration Testers

NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related …

untitled

You can download this recording in asciicast v2 format, as a .cast file.<p>Replay in terminal<p>You can replay this recording in your terminal with …

SpookFlare v2.0 - Loader, Dropper Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures

SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the …

Microsoft Releases a "Windows Command Reference" For Over 250 Console Commands

Microsoft released a 948 page PDF titled the "Windows Command Reference" that contains documentation on over 250 Windows console commands. For each …

Drupwn – Drupal Enumeration Tool & Security Scanner

Drupwn is a Python-based Drupal Enumeration Tool that also includes an exploit mode, which can check for and exploit relevant CVEs.Drupwn Drupal …