Archive | Hacking Tools




DNS Brute Force eXtract – WS-DNS-BFX

There is another option for DNS Brute Forcing which uses threads, so may be faster than TXDNS 2.0 which we posted about recently. What does it do? This program was written to extract valid hosts of a domain that deny zone transfers. The program supports: IPv4 => IP Address of 32 bits. IPv6 => IP […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

SSA 1.5.1 – Security System Analyzer an OVAL Based Scanner

Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Security Software, Windows Hacking | Add a Comment

Metasploit Exploit Framework Version 3.0 Released

Finally it’s out of BETA, Metasploit Framework Version 3.0 has been released and it’s a lot more Windows friendly. The Metasploit Framework (“Metasploit”) is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment

FireCAT – Firefox Catalog of Auditing Tools

After the web 2.0 hacking with firefox and its plugins article I wrote some months ago, recently I found a new way to transform firefox in the ultimate pen-testing tool… actually it has been lying in my inbox for days… …new Firefox Framework Map collection of the most useful security oriented extensions. We called the […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

JBroFuzz 0.5 from OWASP – Stateless Network Protocol Fuzzer

OWASP JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. Written in Java, it allows for the identification of certain classess of security vulnerabilities, by means of creating malformed data and having the network protocol in question consume the data. The purpose of this application is to provide a […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

ObiWaN – Web Server Brute Forcing from Phenoelit

This Phenoelit tool called ObiWaN is written to carry out brute force security testing on Webservers. The idea behind this is webservers with simple challenge-response authentication mechanism mostly have no switches to set up intruder lockout or delay timings for wrong passwords. In fact this is the point to start from. Every user with a […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Web Hacking | Add a Comment

Technika – Automate Common Exploit Tasks

Technika was developed for the computer security professionals to automate common exploitative task from the browser. It acts like a standard OS shell scripting environment. You can script everything from the currently viewed page just like Greasemonkey (spawn processes, unrestricted XMLHttpRequest connections and sockets). You can autorun bookmarklets and perform safe operations on the currently […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking | Add a Comment

ADN – Win32 Active Directory Navigator

ADN – Active Directory Navigator is a little tool to visually explore an Active Directory and perform a simple dictionary attack against users’ password. You can download the tool here: ADN – Active Directory Navigator MD5 4a1e3bb33a25d91d7d7a70877f8374ef SHA1 a0bf80e9426835b88cc6604784d2d949efe5645f Notes: It requires .NET framework and PCSoft framework

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

Stompy – The Web Application Session Analyzer Tool

A new tool dealing with web sessions was recently announced, it’s called stompy, a free tool to perform a fairly detailed black-box assessment of WWW session identifier generation algorithms. Session IDs are commonly used to track authenticated users, and as such, whenever they’re predictable or simply vulnerable to brute-force attacks, we do have a problem. […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

PReplay – A pcap Network Traffic Replay Tool for Windows

There are not many good tools for replaying traffic, most people use WireShark (formely known as Ethereal) for capturing the traffic, but what happens if you want to take that capture and reply it over the wire? Someone has this problem so they decided to code their own solution, thankfully for us! There are quite […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software, Windows Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·