BetterCap v1.5.0 – A complete, modular, portable and easily extensible MITM...
Changelog v 1.5.0 16/3/2016: New Features + New TCP modular and transparent proxy. + Connections within internal nodes on the network are now spoofed. + Memory usage optimization. Fixes: + Fixed a bug...
View ArticleFluxion is the future (a tool helps to automate the process of testing router...
Fluxion is a remake of linset by vk439 with fixed bugs and added features. It’s compatible with the latest release of Kali (Rolling) How it works + Scan the networks. + Capture handshake (can’t be used...
View ArticleResponder v2.3-git – an LLMNR, NBT-NS and MDNS poisoner.
Latest change v2.3-git 8/6/2016: + Fingerprint.py; Fixed color bug in Analyze mode. + settings.py; fixed minor bug. + Responder.conf; Set AutoIgnoreAfterSuccess = Off by default, up to the pentester to...
View Articlethc-ipv6 v3.1dev-git ~ IPv6 attack toolkit.
changelog v3.1dev-git: * fake_router26: new -f option to specify the sending mac address (thanks to Scott Winegarden for the patch) [1/7/2016] * added alive2map.sh script to create a network map...
View Articlemountain_goat – a PoC Off-Path TCP Exploits: Global Rate Limit Considered...
This is a PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous....
View ArticleWiFi-Pumpkin v0.8.1 – Framework for Rogue Wi-Fi Access Point Attack.
Changelog Wifi-Pumpkin v0.8.1: ——————————————– – re-design all GUI Menu->view – added new report logger GUI – added new sessions for Rogue AP loggers – added new plugin BDFProxy-ng – added new theme...
View ArticleResponder & MultiRelay For Windows v1.2 – an LLMNR, NBT-NS and MDNS poisoner.
This tool is first an LLMNR, NBT-NS and MDNS responder, it will answer to specific NBT-NS (NetBIOS Name Service) queries based on their name suffix (see: http://support.microsoft.com/kb/163409). By...
View ArticleJudasDNS – Nameserver DNS poisoning attacks.
LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleWMDFrame – Weapon of Mass Destruction.
LEGAL DISCLAMER The author does not hold any responsibility about the bad use of this script, remember that attacking targets without prior concent its ilegal and punish by law, this script was build...
View ArticleRogueSploit – a Powerfull social engeering Wi-Fi trap!
::DISCLAIMER:: RogueSploit is intended to be used for legal security purposes only, and you should only use it to protect networks/hosts you own or have permission to test. Any other use is not the...
View Articleoutis is a custom Remote Administration Tool (RAT).
Disclaimer: Use at your own risk. Do not use without full consent of everyone involved. For educational purposes only. outis is a custom Remote Administration Tool (RAT) or something like that. Think...
View Articlesubjack is a Hostile Subdomain Takeover tool.
subjack is a Hostile Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked. With Go’s speed and efficiency, this tool...
View Article