LDAPmonitor – Monitor Creation, Deletion And Changes To LDAP Objects Live During Your Pentest Or System Administration!

Monitor creation, deletion and changes to LDAP objects live during your pentest or system administration! With this tool you can quickly see if your attack worked and if it changed LDAP attributes of the target object. Features Feature Python (.py) CSharp (.exe) Powershell (.ps1) LDAPS support ✔️ ✔️ ✔️ Random delay in seconds between queriesRead More

Smersh – A Pentest Oriented Collaborative Tool Used To Track The Progress Of Your Company’S Missions

Smersh is a pentest oriented collaborative tool used to track the progress of your company’s missions and generate rapport. Preview front (Angular): Documentation All information is available at the following address: https://docs.smersh.app How to contribute ? Just fork repository then create branch, work and push your content + create PR git checkout -b MyBranchgit addRead More

Pollenisator – Collaborative Pentest Tool With Highly Customizable Tools

Pollenisator is a tool aiming to assist pentesters and auditor automating the use of some tools/scripts and keep track of them. Written in python 3 Provides a modelisation of “pentest objects” : Scope, Hosts, Ports, Commands, Tools etc. Tools/scripts are separated into 4 categories : wave, Network/domain, IP, Port Objects are stored in a NoSQLRead More

Eyeballer – Convolutional Neural Network For Analyzing Pentest Screenshots

Eyeballer is meant for large-scope network penetration tests where you need to find “interesting” targets from a huge set of web-based hosts. Go ahead and use your favorite screenshotting tool like normal (EyeWitness or GoWitness) and then run them through Eyeballer to tell you what’s likely to contain vulnerabilities, and what isn’t. Example Labels Old-LookingRead More

Writehat – A Pentest Reporting Tool Written In Python

WriteHat is a reporting tool which removes Microsoft Word (and many hours of suffering) from the reporting process. Markdown –> HTML –> PDF. Created by penetration testers, for penetration testers – but can be used to generate any kind of report. Written in Django (Python 3). Features: Effortlessly generate beautiful pentest reports On-the-fly drag-and-drop reportRead More

Linux-Evil-Toolkit – A Framework That Aims To Centralize, Standardize And Simplify The Use Of Various Security Tools For Pentest Professionals

Linux evil toolkit is a framework that aims to centralize, standardize and simplify the use of various security tools for pentest professionals.LETK (Linux evil toolkit) has few simple commands, one of which is theINIT that allows you to define a target, and thus use all the tools without typing anything else.Is LETK better than setoolkit?Read More

PCWT – A Web Application That Makes It Easy To Run Your Pentest And Bug Bounty Projects

A web application that makes it easy to run your pentest and bug bounty projects. Description The app provides a convenient web interface for working with various types of files that are used during the pentest, automate port scan and subdomain search. Main page   Project settings Domains dashboard   Port scan You can scanRead More

SCREEN_KILLER – Tool To Track Progress For Reporting (Capture Screenshot, Commands And Outputs) During Pentest Engagement And OSCP

This script was to developed to capture screenshot during pentest engagment and OSCP. IMPORTANT: The screenshot feature is no longer allowed for exam but the terminal logging is allowed for exam. If you like the tool and for my personal motivation so as to develop other tools please a +1 star * The tool canRead More

PurpleCloud – An Infrastructure As Code (IaC) Deployment Of A Small Active Directory Pentest Lab In The Cloud

Pentest Cyber Range for a small Active Directory Domain. Automated templates for building your own Pentest/Red Team/Cyber Range in the Azure cloud! Purple Cloud is a small Active Directory enterprise deployment automated with Terraform / Ansible Playbook templates to be deployed in Azure. Purple Cloud also includes an adversary node implemented as a docker containerRead More

X