Exploitation Framework for Embedded devices – RouterSploit

The RouterSploit Framework is an open-source exploitation framework devoted to embedded devices. It includes various modules that aid penetration testing operations: exploits – modules that take advantage of identified vulnerabilities creds – modules designed to test credentials against network...
Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix – Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for and njection eploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the view to find bugs, errors or vulnerabilities related to...
Automated Telegram Based SQLi Vulnerability Scanner

Powerful and Fully Automated Telegram Based SQLi Vulnerability Scanner – Katyusha Scanner

New powerful Fully Automated SQli Vulnerability scanner which inherits the functionality of Telegram messenger and Arachni Scanner introduced by Russian member in dark web forum “Katyusha Scanner,” comes into limelight immediately. Outstanding support provided for this product including frequent updates...
Linux Exploit Suggester -simple script to keep track of vulnerabilities

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS...

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain ‘root‘ on a legitimate penetration test or governing examining body. This Script will perform by "uname...
DDOS Kali

DDOS a website anonymously by using kali linux

DDOS tools are capable of putting heavy loads on HTTP servers and bring them to their knees by exhausting it's resources. What is DDOS attack? A type of attack where Multiple compromised systems attacking a single target, which denies access to the...

Most Popular

Recommended