Posts

Showing posts with the label Exploit

Pentol - Pentester Toolkit For Fiddler2

Image
PENTOL - Pentester Toolkit is built equally a plugin for the Fiddler HTTP debugging proxy. Features CORS DETECTED Cross-Origin Resource Sharing CRLF DETECTED HTTP reply splitting Headers DETECTED (X-Frame-Options) USAGE Install Fiddler2 Open Fiddler2 Press Key CTRL + R or Rules > Customize Rules... Copy all script SampleRules.js Press Key CTRL + S for Save Check tools inwards Rules TAB Credits Thanks to allah Eka Syahwan (Creator) bugrecon / H1 / bugcrowd Edo Maland (Powerstager) https://github.com/Screetsec Jack Wilder admin inwards http://www.linuxsec.org Disclaimer Note: modifications, changes, or changes to this code tin locomote accepted, however, every world liberate that uses this code must locomote approved past times writing this tool (Eka S) Download PENTOL

Jsshell - An Interactive Multi-User Spider Web Js Shell

Image
An interactive multi-user spider web based javascript shell. It was initially created inward social club to debug remote esoteric browsers during experiments in addition to research. This tool tin last easily attached to XSS (Cross Site Scripting) payload to accomplish browser remote code execution (similar to the BeeF framework). Version 2.0 is created only from scratch, introducing novel exciting features, stability in addition to maintainability. Author Daniel Abeles . Shell Video Features Multi customer support Cyclic DOM objects support Pre flying scripts Command Queue & Context Extensible amongst Plugins Injectable via <script> tags Dumping command output to file Shell pagination Installation & Setup Config File In the resources directory, update the config.json file amongst your desired configuration: Database host - if running amongst the docker deployment method, pick out the database host every bit db (which is the internal hos...

Autosploit V3.0 - Automated Volume Exploiter

Image
As the cite mightiness advise AutoSploit attempts to automate the exploitation of remote hosts. Targets tin hit the sack hold out collected automatically through Shodan, Censys or Zoomeye. But options to add together your custom targets in addition to host lists convey been included every bit well. The available Metasploit modules convey been selected to facilitate Remote Code Execution in addition to to endeavour to gain Reverse TCP Shells and/or Meterpreter sessions. Workspace, local host in addition to local port for MSF facilitated dorsum connections are configured past times filling out the dialog that comes upward earlier the exploit constituent is started Operational Security Consideration Receiving dorsum connections on your local machine mightiness non hold out the best stance from an OPSEC standpoint. Instead reckon running this tool from a VPS that has all the dependencies required, available. The novel version of AutoSploit has a characteristic that allows you lot ...

Remot3d V2.0 - Tool Created For Large Pentesters Equally Good Equally Only For The Pleasance Of Defacers To Command Server Past Times Backdoors

Image
Remot3d - Influenza A virus subtype H5N1 tool made to generate backdoor to command as well as exploit a server where the server runs the PHP (Hypertext Preprocessor) program.                 Equipped amongst a backdoor that has been Obfuscated which agency that 100% FUD (FULLY UNDETECTABLE) inward other words tin penetrate the firewall of a server because of its ignorance if it's a Malware, Written inward Shell Script Language or usually known every bit BASH past times a xvi twelvemonth onetime teenager. Screenshots List of Remot3d Functions Create backdoor for windows or linux servers (can run php file) Bypass disable function's amongst imap_open vulnerability Bypass read file /etc/passwd amongst cURL or Unique Logic Script's Generating Backdoor as well as tin hold upwards remoted on Tools Some other fun materials :) Getting Started git clone https://github....

Vulnx - Cms As Well As Vulnerabilites Detector As Well As An Intelligent Car Rhythm Out Injector

Image
Vulnx is a cms in addition to vulnerabilites detection, an intelligent auto shell injector , fast cms detection of target in addition to fast scanner in addition to informations gathering similar subdomains, ipaddresses, country, org, timezone, region, ans in addition to to a greater extent than ... Instead of injecting musical rhythm out in addition to checking it industrial plant similar all the other tools do, vulnx analyses the answer amongst in addition to recieve if musical rhythm out success uploaded or no. vulnx is searching for urls amongst dorks . Features Detect cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia) Target informations gatherings Target Subdomains gathering Multi-threading on demand Checks for vulnerabilites Auto musical rhythm out injector Exploit dork searcher Exploits Joomla Com Jce Com Jwallpapers Com Jdownloads Com Weblinks Com Fabrik Com Jdownloads Index Com Foxconta...

Phonesploit - Using Opened Upwards Adb Ports Nosotros Tin Exploit A Devive

Image
Using opened upwardly Adb ports nosotros tin plow over the sack exploit a device yous tin plow over the sack notice opened upwardly ports hither https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To notice out how to access a local device: I volition before long brand a tutorial on how to role PhoneSploit HOW TO INSTALL extract adb.rar to the phonesploit directory git clone https://github.com/Zucccs/PhoneSploit cd PhoneSploit python2 main.py Download PhoneSploit

Phonesploit V1.2 - Using Opened Upwardly Adb Ports Nosotros Tin Exploit A Andriod Device

Image
Using opened upwards Adb ports nosotros tin exploit an Andriod device. you lot tin detect opened upwards ports hither https://www.shodan.io/search?query=android+debug+bridge+product%3A”Android+Debug+Bridge” To detect out how to access a local device --> https://www.youtube.com/watch?v=OlhCAX1qBQo Recent News (New Update v.1.2) Port Forwarding NetStat Grab wpa_supplicant Turn WiFi On/Off Show Mac/Inet Remove Password Extract apk from app Use Keycode Get Battery Status Get Current Activity HOW TO INSTALL WINDOWS git clone https://github.com/Zucccs/PhoneSploit extract adb.rar to the phonesploit directory cd PhoneSploit pip install colorama python2 main.py HOW TO INSTALL Linux git clone https://github.com/Zucccs/PhoneSploit cd PhoneSploit pip install colorama python2 main_linux.py VIDEO Download PhoneSploit