Awesome hacking. Exploiting.

Carding

Professional
Messages
2,829
Reputation
17
Reaction score
2,076
Points
113
Сегодня перед тобой будет представлен большой список инструментов. Инструменты которые будут представлены в подборке, активно используются на практике при проведении пентестов:

Exploiting:
• AttackSurfaceAnalyzer (https://github.com/microsoft/AttackSurfaceAnalyzer)
• Bashfuscator (https://github.com/Bashfuscator/Bashfuscator)
• BeEF (http://beefproject.com/)
• BugId (https://github.com/SkyLined/BugId)
• CCAT (https://github.com/RhinoSecurityLabs/ccat)
• Commix (http://www.commixproject.com/)
• DLLInjector (https://github.com/OpenSecurityResearch/dllinjector)
• DefenderCheck (https://github.com/matterpreter/DefenderCheck)
• Donut (https://github.com/TheWover/donut)
• Drupwn (https://github.com/immunIT/drupwn)
• EfiGuard (https://github.com/Mattiwatti/EfiGuard)
• EtherSploit-IP (https://github.com/thiagoralves/EtherSploit-IP)
• Evilgrade (https://github.com/infobyte/evilgrade)
• Exe2hex (https://github.com/g0tmi1k/exe2hex)
• Fathomless (https://github.com/xor-function/fathomless)
• Gorsair (https://github.com/Ullaakut/Gorsair)
• Kube-hunter (https://github.com/aquasecurity/kube-hunter)
• LAVA (https://github.com/panda-re/lava)
• Linux Exploit Suggester (https://github.com/PenturaLabs/Linux_Exploit_Suggester)
• Linux-exploit-suggester (https://github.com/PenturaLabs/Linux_Exploit_Suggester)
• Macrome (https://github.com/michaelweber/Macrome)
• Metasploit Framework (http://www.metasploit.com/)
• MeterSSH (https://github.com/trustedsec/meterssh)
• Nessus (http://www.tenable.com/products/nessus-vulnerability-scanner)
• Nexpose (https://www.rapid7.com/products/nexpose/)
• Nishang (https://github.com/samratashok/nishang)
• OpenVAS (http://www.openvas.org/)
• PSKernel-Primitives (https://github.com/FuzzySecurity/PSKernel-Primitives)
• Peirates (https://github.com/inguardians/peirates)
• PowerSploit (https://github.com/PowerShellMafia/PowerSploit/)
• ROP Gadget (http://shell-storm.org/project/ROPgadget/)
• Routersploit (https://github.com/reverse-shell/routersploit)
• Rupture (https://github.com/dionyziz/rupture/)
• Shark (https://github.com/9176324/Shark)
• SharpBlock (https://github.com/CCob/SharpBlock)
• SharpShooter (https://github.com/mdsecactivebreach/SharpShooter)
• ShellcodeCompiler (https://github.com/NytroRST/ShellcodeCompiler)
• Shellen (https://github.com/merrychap/shellen)
• Shellsploit (https://github.com/b3mb4m/shellsploit-framework)
• Spoodle (https://github.com/vjex/spoodle)
• SysWhispers (https://github.com/jthuraisamy/SysWhispers#syswhispers)
• Unicorn (https://github.com/trustedsec/unicorn)
• Veil Framework (https://www.veil-framework.com/)
• Vuls (https://github.com/future-architect/vuls)
• Windows Exploit Suggester (https://github.com/GDSSecurity/Windows-Exploit-Suggester)
• Ysoserial.net (https://github.com/pwntester/ysoserial.net)
 
Top