5/20/2023 0 Comments Wxhexeditor wikiShellter - Dynamic shellcode injection tool, and the first truly dynamic PE infector ever created.Hyperion - Runtime encryptor for 32-bit portable executables ("PE.CarbonCopy - Tool that creates a spoofed certificate of any online website and signs an Executable for AV evasion.AntiVirus Evasion Tool (AVET) - Post-process exploits containing executable files targeted for Windows machines to avoid being recognized by antivirus software.kalitorify - Transparent proxy through Tor for Kali Linux OS.dos-over-tor - Proof of concept denial of service over Tor stress test tool.Tor - Free software and onion routed overlay network that helps you defend against traffic analysis. Tails - Live operating system aiming to preserve your privacy and anonymity.OnionScan - Tool for investigating the Dark Web by finding operational security issues introduced by Tor hidden service operators.Nipe - Script to redirect all traffic from the machine to the Tor network.What Every Browser Knows About You - Comprehensive detection page to test your own Web browser's configuration for privacy and identity leaks.Metadata Anonymization Toolkit (MAT) - Metadata removal tool, supporting a wide range of commonly used file formats, written in Python3.Fing - Network scanning and host enumeration app that performs NetBIOS, UPnP, Bonjour, SNMP, and various other advanced device fingerprinting techniques.cSploit - Advanced IT security professional toolkit on Android featuring an integrated Metasploit daemon and MITM capabilities.Web-accessible source code ripping tools.Web path discovery and bruteforcing tools.Web application and resource analysis tools.Proxies and Machine-in-the-Middle (MITM) Tools.Network Traffic Replay and Editing Tools.Intentionally Vulnerable Systems as Docker Containers.This project is supported by Netsparker Web Application Security Scanner Contents This work is licensed under a Creative Commons Attribution 4.0 International License. Please check the Contributing Guidelines for more details. Your contributions and suggestions are heartily ♥ welcome. Should you discover a vulnerability, please follow this guidance to report it responsibly. Penetration testing is the practice of launching authorized, simulated attacks against computer systems and their physical infrastructure to expose potential security weaknesses and vulnerabilities. A collection of awesome penetration testing and offensive cybersecurity resources.
0 Comments
Leave a Reply. |