RandIP - Network Mapper To Find Servers

RandIP – Network Mapper To Find Servers

RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH. RandIP – Network Mapper Features HTTP and HTTPS enumeration Python enumeration exploits SSH enumeration exploits Logger and error-code handler SSH and Telnet Timeouts to […]

Topic: Networking Hacking
Nipe - Make Tor Default Gateway For Network

Nipe – Make Tor Default Gateway For Network

Nipe is a Perl script to make Tor default gateway for network, this script enables you to directly route all your traffic from your computer to the Tor network through which you can surf the internet anonymously without having to worry about being tracked or traced back. Tor enables users to surf the internet, chat […]

Topic: Privacy
Mosca - Manual Static Analysis Tool To Find Bugs

Mosca – Manual Static Analysis Tool To Find Bugs

Mosca is a manual static analysis tool written in C designed to find bugs in the code before it is compiled, much like a grep unix command. There are various ‘egg’ modules which contain patterns to scan for, it can scan through files recursively limited by file extension and logs results to an XML text […]

Topic: Countermeasures
Slurp - Amazon AWS S3 Bucket Enumerator

Slurp – Amazon AWS S3 Bucket Enumerator

Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan from an external perspective or an AWS API to scan internally. There are two modes that this tool operates at; blackbox and whitebox mode. Whitebox mode (or internal) is significantly faster than blackbox (external) mode. Blackbox (external) […]

Topic: Hacking Tools
US Government Cyber Security Still Inadequate

US Government Cyber Security Still Inadequate

Surprise, surprise, surprise – an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems and poor adoption of cyber controls and tooling. US Government security has often been called into question but we’d hope in 2019 it would have gotten better and at least everyone would have adopted the […]

Topic: Hacking News
BloodHound - Hacking Active Directory Trust Relationships

BloodHound – Hacking Active Directory Trust Relationships

BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use it to identify and eliminate those same […]

Topic: Hacking Tools