Chuckle – An automated SMB Relay Script.
Chuckle – An automated SMB Relay Script. Latest Change 2/3/2016 : chuckle.sh; Modified to use unixwiz nbtscan for reliability. chuckle.sh Chuckle requires a few tools to work: + Nmap + Responder +...
View ArticleSQLinject.sh – Script to automate the process of hijacking an MSSQL database...
This script is designed to automate the process of hijacking an MSSQL database connection. This script can be used to perform a MITM attack between two IP addresses using ettercap and ARP spoofing. You...
View ArticleWPS-SLAUGHTER : A WPS cracking script.
This tool helps to automate the process of testing router WPS vulnerability to flood attacks using multiple* wireless adapters to see if it will reboot and UNLOCK. wps-slaughter usage: git clone...
View Articleranger v0.43b – A tool to support security professionals to access and...
Latest Change v0.43b (25/2/2016): + ranger.py: — WMIEXEC Metasploit web_delivery Memory Injector. — ATEXEC Metasploit web_delivery Memory Injector. — Create Pasteable web_delivery Attack. A tool to...
View Articlewifi hacking script v1.3 supported securities: WEP, WPS, WPA, WPA2.
Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) Menu Options: 0) Full Automatic Mode (Applies To All Encryption Types) 1) WEP...
View ArticleReVdK3 Acces Point pentest Script.
This Script was created for Access Points that locks up for long periods of time. It works by starting reaver and continously detect when reaver is rate limiting pins, once reaver detects the AP is...
View Articlebackdoor-apk is a shell script that simplifies the process of adding a...
backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script should have working knowledge of Linux, Bash, Metasploit, Apktool,...
View ArticleAirgeddon v3.41dev – This is a multi-use bash script for Linux systems to...
changelog v3.41dev: + Show network cards chipset while selecting interface + Some language strings changed + License updated to GPL3+ + Added Open Document SpreadSheet for easy translation to be used...
View ArticleFenrir is a simple IOC scanner bash script.
Fenrir is a simple IOC scanner bash script. It allows scanning Linux/Unix/OSX systems for the following Indicators of Compromise (IOCs): + Hashes ** MD5, SHA1 and SHA256 (using md5sum, sha1sum, sha -a...
View ArticlePOOFITEE – Linux Scripting “Perfect Owner Only Firewall – Invisible To...
BULLET-PROOF YOUR “OWNER-ACCESS-ONLY” LINUX SERVER FROM HACKERS WITH IPTABLES AND ROBUST SHELL SCRIPTING. Bare minimum packages and whitelist-only access to your Linux home surveillance &/or...
View Articleusbdeath ~ anti-forensic tool that writes udev rules for known usb devices.
usbdeath is a small script inspired by usbkill( https://github.com/hephaest0s/usbkill), “an anti-forensic kill-switch that waits for a change on your USB ports and then immediately shuts down your...
View ArticleConcierge – A collection (eventually) of Physical Access Control and...
Concierge is A collection (eventually) of Physical Access Control and Monitoring attacks and utilities. These will all eventually evolve into a more effective and user friendly set of tools, but for...
View ArticlePOOFITEE v0.0.1 – Linux Scripting “Perfect Owner Only Firewall – Invisible To...
Changelog POOFITEE v0.0.1: – At first blush, we thought POOFITEE was operational 2016-09-16, but a few bugs remained until 2016-10-01. After 2016-10-01 this “Original” branch is only expected to...
View Articlecreate_ap v0.4 script for creates a NATed or Bridged WiFi Access Point.
Changelog create_ap v0.4: + All codescripting bug fixes. create_ap v0.4 create_ap is a script for creates a NATed or Bridged WiFi Access Point. Features * Create an AP (Access Point) at any channel. *...
View Articlepwndsh – Post-exploitation framework (and an interactive shell) developed in...
pwnd.sh is a post-exploitation framework (and an interactive shell) developed in Bash shell scripting. It aims to be cross-platform (Linux, Mac OS X, Solaris etc.) and with little to no external...
View ArticleSysScout – A Network Forensics/Incident Response Tool.
SysScout is a fully encapsulated script that quickly and easily pulls local machine information from Linux-Based systems. A simple, easy to use Incident Response and Network Forensics tool. Unlike...
View Articleyodo – Local Privilege Escalation POC.
Yodo is a tool proves how easy it is to become root via limited sudo permissions or via dirtyc0w. About Impact dirtyc0w * An unprivileged local user could use this flaw to gain write access to...
View Articlejammer – Jam Wifi Networks That Your Wireless Card Can Reach.
jammer is A Bash script to automate the continuous circular deauthentication of all the wifi networks in your reach. Keep in mind that it is generally illegal to use the script at your neihborhood, It...
View Articlepentmenu v1.3.1 – A simple bash script for various basic penetration test.
Disclaimer: This script is only for responsible, authorised use. You are responsible for your own actions and this script is provided without warranty or guarantee of any kind. The author(s) accept no...
View Articlelunar – a unix security auditing tool and reporting.
Introduction: Lunar is a bash scripts for generates a scored audit report of a Unix host’s security. It is based on the CIS and other frameworks. Why a shell script? I wanted a tool that was able to...
View Article