Fingerprintx – Tool to Fingerprint Services Running on Ports

Fingerprintx is a port scanner tool that helps to find the open ports and to fingerprintx the services running in the port. What is the Open Port Scanner? The open port scanner examines the external IP address and detects open ports on the connection. It aims to identify if port forwarding is correctly configured or […]

April 6, 2023
Read More >>

NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim

NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Instructions Installation Getting Started Configuration Before using NimPlant, create the configuration file config.toml. It is recommended to copy config.toml.example and work from there. An overview of settings is provided below. Category Setting Description server ip The IP that the C2 web […]

April 6, 2023
Read More >>

Tool-X – Single Click Installer For 70 Hacking Tools on Android

Tool-x is a recently developed installation tool for Android that functions in conjunction with the Termux emulator. The installer can deploy almost 70 different security tools by simply clicking once. Termux Emulator This no-cost, open-source application enables the Linux command shell to function through the Android terminal. You can add extra packages to enhance the […]

April 5, 2023
Read More >>

Subfinder – A New Tool to Discover Subdomains for Websites

Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains that should be “blog.kalilinuxtutorials.com” and “store.kalilinuxtutorials.com” are subdomains of the “kalilinuxtutorials.com” domain. What is Subdomain? Subdomains are created as subsets of the primary domain name to help organize and navigate different website sections. The primary […]

April 4, 2023
Read More >>

Hunxploit04 – A new OSINT Tools for Information Gathering

Gathering information is essential in ethical hacking, as it entails accumulating extensive data regarding the targeted system or organization. The significance of this phase lies in the greater the amount of information an ethical hacker possesses, the more equipped they are to recognize vulnerabilities and possible avenues of attack. Open Source Intelligence (OSINT) OSINT involves […]

April 3, 2023
Read More >>

FindUncommonShares A Python Equivalent Of PowerView’s Invoke-ShareFinder.ps1 Allowing To Quickly Find Uncommon Shares In Vast Windows Domains

FindUncommonShares.py is a Python equivalent of PowerView’s Invoke-ShareFinder.ps1 allowing to quickly find uncommon shares in vast Windows Domains. Features Usage Examples : Each JSON entry looks like this: { “computer”: { “fqdn”: “DC01.LAB.local”, “ip”: “192.168.1.1” }, “share”: { “name”: “ADMIN$”, “comment”: “Remote Admin”, “hidden”: true, “uncpath”: “\\\\192.168.1.46\\ADMIN$\\”, “type”: { “stype_value”: 2147483648, “stype_flags”: [ “STYPE_DISKTREE”, “STYPE_TEMPORARY” […]

March 31, 2023
Read More >>

CertWatcher : A Tool For Capture And Tracking Certificate Transparency Logs, Using YAML Templates Based DSL

CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates based DSL. CertWatcher is a tool for capture and tracking certificate transparency logs, using YAML templates. The tool helps to detect and analyze phishing websites and regular expression patterns, and is designed to make it easy to use for security professionals […]

March 31, 2023
Read More >>