Category Archives: Pentesting

EmPyre – post-exploitation OS X/Linux agent

EmPyre - RAT (Remote Access Trojan) EmPyre is a pure Python post-exploitation agent built on cryptologically-secure communications and a flexible architecture.

Routersploit- The Router Exploitation Framework

RouterSploit is an open source Framework that will help in penetration testing and post exploitation embedded devices.

PS>Attack – Portable PowerShell console for making Pentest

PS>Attack is a PowerShell tool that you can use to perform offensive attack, it combines several modules that were released for penetration testing. some of the modules are Powersploit ,PowerTools, Nishang , Powercat and Inveigh.

Pentestly – Internal penetration testing framework

Pentestly is a combination of expanding Python tools for use in penetration tests. The goal is to utilize a familiar user interface while making contributions to the framework easy with the power of Python.

phpsploit- Stealth post-exploitation framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalation purposes.

EVIL FOCA — NETWORK ATTACK TOOLKIT

Evil Foca is a tool for security pentesters and auditors whose purpose is to test security in IPv4 and IPv6 data networks. The tool is capable of carrying out various attacks..

Sn1per – Automated Pentest Recon Scanner

Sn1per is an automated open source scanner that you can use during penetration testing. the tool allow to use some compilation of pentest utility such as the harvester , nmap and brute force against your target. some of the features