Chiron is an IPv6 Security Assessment Framework.
LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleChimayRed – Reverse engineering of Mikrotik exploits from Vault 7 CIA Leaks.
LEGAL DISCLAMER: The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleShellen is an interactive shellcoding environment.
Shellen is an interactive shellcoding environment. If you want a handy tool to write shellcodes, then shellen may be your friend. Also, it can be used just as assembly/disassembly tool. Features: +...
View ArticleAutoSploit – Automated Mass Exploiter.
LEGAL DISCLAMER! The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleNatlog is a utility logging traffic through a firewall doing source natting.
Natlog is a utility logging traffic through a firewall that performs source-NATting (a.k.a. POSTROUTING). Firewalls like iptables usually offer POSTROUTING source network address translation facilities...
View ArticleGTScan – The Nmap Scanner for Telco, with focus on telecom security.
GTScan is a The Nmap Scanner for Telco. With the current focus on telecom security, there used tools in day to day IT side penetration testing should be extended to telecom as well. From here came the...
View ArticleDCSYNCMonitor – Monitors for DCSYNC and DCSHADOW attacks and create custom...
DCSYNCMonitor tool is an application/service that can be deployed on Domain controllers to alert on Domain Controller Syncronization attempts. When an attempt is detected, the tool will write an event...
View ArticleSippts – Set of tools to security audit SIP based VoIP Systems.
Sippts is a suite of tools to audit VoIP servers and devices using SIP protocols. Sippts is programmed in Perl script and it consists of: + Sipscan : Fast scanner for SIP services that uses...
View Articleattackintel – Quickly dump known tactics/techniques of a specific Mitre...
attackintel A simple python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat(Threat-Hunting) groups. attackintel Goals +...
View ArticleEternalView is an all in one basic information gathering tool.
CAUTION: This tool is purely for educational purposes, don’t use it on any website without the permission of it’s owner. The user is responsible for his/her actions! EternalView is an all in one basic...
View ArticleWhapa is an android whatsapp database parser that automates the process.
Whapa is an android whatsapp database parser that automates the process. The main purpose of whapa is to present the data handled by the Sqlite database in a way that is comprehensible to the analyst....
View Articlerastrea2r – Collecting & Hunting for IOC with gusto and style.
Description Ever wanted to turn your AV console into an Incident Response & Threat Hunting machine? Rastrea2r (pronounced “rastreador” – hunter- in Spanish) is a multi-platform open source tool...
View Article