Domained – Multi Tool Subdomain Enumeration

Use Netsparker

Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains that are passed to EyeWitness for reporting.

Domained - Multi Tool Subdomain Enumeration

This produces categorized screenshots, server response headers and signature based default credential checking. It is written in Python heavily leveraging Recon-ng.

Domains Subdomain Enumeration Tools Leveraged

Subdomain Enumeraton Tools:

Reporting + Wordlists:

Domained Subdomain Enumeration Tool Usage

Subdomain Enumeration Examples

First Steps are to install required Python modules and tools:

Example 1 – Uses subdomain (Sublist3r (+subbrute), enumall, Knock, Amass, and SubFinder)

Example 2: – Uses subdomain with seclist subdomain list bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall, and SubFinder), adds ports 8443/8080 and checks if on VPN

Example 3: – Uses subdomain with large-all.txt bruteforcing (massdns, subbrute, Sublist3r, Amass, enumall and SubFinder)

Example 4: – Uses subdomain and only Amass and SubFinder

Example 5: – Uses subdomain, only Amass and SubFinder and notification

Example 6: – Uses subdomain with no EyeWitness

Note: --bruteall must be used with the -b flag

You can download Domained here:

Or read more here.

Topic: Hacking Tools

Acunetix Vulnerability Scanner For Linux Now Available

Use Netsparker

Acunetix Vulnerability Scanner For Linux is now available, now you get all of the functionality of Acunetix, with all of the dependability of Linux.

Acunetix Vulnerability Scanner For Linux Now Available

Following extensive customer research, it became clear to us that a number of customers and security community professionals preferred to run on Linux. Tech professionals have long chosen Linux for their servers and computers due to its robust security. However, in recent years, this open source operating system has become much more user-friendly. We are very proud to be one of the first commercial web vulnerability scanners to be released for Linux.

Nicholas Sciberras, CTO

Benefits of Running Acunetix Vulnerability Scanner For Linux OS

  • Reliability and security: Linux is the operating system most often selected for servers that need close to 100% uptime. Using Linux increases the reliability needed for the thousands of operations required to scan a website.
  • Cost-effectiveness: Acunetix customers can run the scanner in their own private cloud on either Amazon AWS, Digital Ocean or Google Cloud, for example.
  • Performance: Linux requires less resources to run, resulting in extra resources to increase scanner performance.

You can read the full post here:

Acunetix Vulnerability Scanner Now Also on Linux

Topic: Advertorial

Gerix WiFi Cracker – Wireless 802.11 Hacking Tool With GUI

Use Netsparker

Gerix WiFi cracker is an easy to use Wireless 802.11 Hacking Tool with a GUI, it was originally made to run on BackTrack and this version has been updated for Kali (2018.1).

Gerix WiFi Cracker - Wireless 802.11 Hacking Tool With GUI

To get it up and running make sure you do:

Running Gerix Wireless 802.11 Hacking Tool

You can download Gerix here:

Or read more here.

Topic: Wireless Hacking

Malcom – Malware Communication Analyzer

Use Netsparker

Malcom is a Malware Communication Analyzer designed to analyze a system’s network communication using graphical representations of network traffic, and cross-reference them with known malware sources.

Malcom - Malware Communication Analyzer

This comes handy when analyzing how certain malware species try to communicate with the outside world.

Malcom Malware Communication Analyzer Features

Malcom can help you:

  • Detect central command and control (C&C) servers
  • Understand peer-to-peer networks
  • Observe DNS fast-flux infrastructures
  • Quickly determine if a network artifact is ‘known-bad’

The aim of Malcom is to make malware analysis and intel gathering faster by providing a human-readable version of network traffic originating from a given host or network. Convert network traffic information to actionable intelligence faster.

Installing Malcom Malware Communication Analyzer

Malcom is written in Python. Provided you have the necessary libraries, you should be able to run it on any platform. It’s recommended to use Python virtual environments (virtualenv) so as not to mess up your system libraries.

Install git, python and libevent libs, mongodb, redis, and other dependencies:

Environment for Malware Communication Analyzer

If you’re used to doing malware analysis, you probably already have tons of virtual machines running on a host OS. Just install Malcom on a new VM, and route your other VM’s connections through Malcom. Use to activate routing / NATing on the VM Malcom is running on. You’ll need to add an extra network card to the guest OS.

As long as it’s getting layer-3 network data, Malcom can be deployed anywhere. Although it’s not recommended to use it on high-availability networks (it wasn’t designed to be fast), you can have it running at the end of your switch’s mirror port or on your gateway.

You can download Malcom here:

Or read more here.

Topic: Countermeasures
WepAttack - WLAN 802.11 WEP Key Hacking Tool

WepAttack – WLAN 802.11 WEP Key Hacking Tool

WepAttack is a WLAN open source Linux WEP key hacking tool for breaking 802.11 WEP keys using a wordlist based dictionary attack. This tool is based on an active dictionary attack that tests millions of words to find the right key. Only one packet is required to start an attack. What is a WEP Key? […]

Topic: Wireless Hacking
Eraser - Windows Secure Erase Hard Drive Wiper

Eraser – Windows Secure Erase Hard Drive Wiper

Eraser is a hard drive wiper for Windows which allows you to run a secure erase and completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Eraser is a Windows focused hard drive wiper and is currently supported under Windows XP (with Service Pack 3), Windows Server […]

Topic: Privacy