domingo, 30 de agosto de 2020

Airpwn: A Wireless Packet Injector


"Airpwn is a framework for 802.11 (wireless) packet injection. Airpwn listens to incoming wireless packets, and if the data matches a pattern specified in the config files, custom content is injected "spoofed" from the wireless access point. From the perspective of the wireless client, airpwn becomes the server." read more...


Website: http://airpwn.sourceforge.net

Related posts


  1. Hackers Toolbox
  2. Hacking Tools For Windows
  3. Hacker Tools Apk Download
  4. Hacking Tools Github
  5. Hacker Tools For Ios
  6. Hacker Tools Windows
  7. Hacking Tools Mac
  8. Hacker Tools Online
  9. Pentest Tools For Android
  10. Game Hacking
  11. Black Hat Hacker Tools
  12. Pentest Tools For Windows
  13. Hacks And Tools
  14. Wifi Hacker Tools For Windows
  15. Pentest Tools Online
  16. Pentest Automation Tools
  17. Hacking App
  18. Hacker Tools Github
  19. Android Hack Tools Github
  20. Hack Tools Pc
  21. Hacking Tools Usb
  22. Hacker Tools Free Download
  23. Pentest Recon Tools
  24. Hack Tools For Windows
  25. World No 1 Hacker Software
  26. Free Pentest Tools For Windows
  27. Hack Tools For Mac
  28. Kik Hack Tools
  29. Hacker Tools 2019
  30. Hack Tool Apk No Root
  31. Pentest Tools Linux
  32. Pentest Tools Linux
  33. Hacker Tools For Mac
  34. Hacking Tools For Windows
  35. Hacks And Tools
  36. Pentest Tools
  37. Hacker Techniques Tools And Incident Handling
  38. Usb Pentest Tools
  39. Hack Tool Apk
  40. Install Pentest Tools Ubuntu
  41. Hackrf Tools
  42. Hacker Tools For Mac
  43. Best Hacking Tools 2019
  44. Hacks And Tools
  45. Tools Used For Hacking
  46. Usb Pentest Tools
  47. Hack Tools For Mac
  48. Pentest Tools Linux
  49. Hacking Tools For Games
  50. Termux Hacking Tools 2019
  51. Hacking App
  52. Hack Tools Github
  53. Hacker Tools
  54. Hacker Tools Online
  55. Hacking Tools For Kali Linux
  56. Blackhat Hacker Tools
  57. Hacker Tools Free
  58. Tools Used For Hacking
  59. How To Hack
  60. Hak5 Tools
  61. Hacks And Tools
  62. Hacking Tools Mac
  63. Hacking Tools For Windows
  64. Pentest Tools For Ubuntu
  65. Pentest Tools List
  66. Pentest Tools List
  67. Hacker Security Tools
  68. Pentest Tools
  69. Hack Tool Apk No Root
  70. Hack Tool Apk No Root
  71. Hacker Tools Apk Download
  72. Hacker
  73. Hack Tools For Mac
  74. Hack Rom Tools
  75. Pentest Automation Tools
  76. Pentest Tools Online
  77. Hacking Tools For Beginners
  78. Hacking Tools For Beginners
  79. Hacking Tools Name
  80. Hacker Security Tools
  81. Hacking Tools Github
  82. Hack Tool Apk No Root
  83. Hacker Tools Linux
  84. Hacker Tools Hardware
  85. Hacking Tools Github
  86. Hacking Tools Free Download
  87. Hack Tools
  88. Wifi Hacker Tools For Windows
  89. Pentest Tools Nmap
  90. Hack Tool Apk
  91. Hack Tools For Windows
  92. Game Hacking
  93. Hacking Tools For Windows 7
  94. Hack Website Online Tool
  95. Best Pentesting Tools 2018
  96. Pentest Tools Website
  97. Pentest Tools Online
  98. Hacker Tools Free
  99. Hack Tools Mac
  100. Hacker Tools Software
  101. Hak5 Tools
  102. Pentest Tools For Android
  103. Nsa Hack Tools Download
  104. Pentest Tools
  105. Bluetooth Hacking Tools Kali
  106. Ethical Hacker Tools
  107. Hacking Tools 2020
  108. Usb Pentest Tools
  109. Hacking Tools And Software
  110. Hack Tools For Games
  111. Nsa Hacker Tools
  112. Hacking Tools Software
  113. Github Hacking Tools
  114. Hacker Tools Apk
  115. Pentest Tools For Ubuntu
  116. Hacking Tools Download
  117. Termux Hacking Tools 2019
  118. Pentest Tools Website
  119. Easy Hack Tools
  120. Hacking Tools 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC

Related posts


Raccoon - A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning



Offensive Security Tool for Reconnaissance and Information Gathering.

Features
  • DNS details
  • DNS visual mapping using DNS dumpster
  • WHOIS information
  • TLS Data - supported ciphers, TLS versions, certificate details, and SANs
  • Port Scan
  • Services and scripts scan
  • URL fuzzing and dir/file detection
  • Subdomain enumeration - uses Google Dorking, DNS dumpster queries, SAN discovery, and brute-force
  • Web application data retrieval:
    • CMS detection
    • Web server info and X-Powered-By
    • robots.txt and sitemap extraction
    • Cookie inspection
    • Extracts all fuzzable URLs
    • Discovers HTML forms
    • Retrieves all Email addresses
  • Detects known WAFs
  • Supports anonymous routing through Tor/Proxies
  • Uses asyncio for improved performance
  • Saves output to files - separates targets by folders and modules by files

Roadmap and TODOs
  • Support multiple hosts (read from the file)
  • Rate limit evasion
  • OWASP vulnerabilities scan (RFI, RCE, XSS, SQLi etc.)
  • SearchSploit lookup on results
  • IP ranges support
  • CIDR notation support
  • More output formats

About
A raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
As most of Raccoon's scans are independent and do not rely on each other's results, it utilizes Python's asyncio to run most scans asynchronously.
Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments.
For more options - see "Usage".

Installation
For the latest stable version:
pip install raccoon-scanner
Or clone the GitHub repository for the latest features and changes:
git clone https://github.com/evyatarmeged/Raccoon.git
cd Raccoon
python raccoon_src/main.py

Prerequisites
Raccoon uses Nmap to scan ports as well as utilizes some other Nmap scripts and features. It is mandatory that you have it installed before running Raccoon.
OpenSSL is also used for TLS/SSL scans and should be installed as well.

Usage
Usage: raccoon [OPTIONS]

Options:
--version Show the version and exit.
-t, --target TEXT Target to scan [required]
-d, --dns-records TEXT Comma separated DNS records to query.
Defaults to: A,MX,NS,CNAME,SOA,TXT
--tor-routing Route HTTP traffic through Tor (uses port
9050). Slows total runtime significantly
--proxy-list TEXT Path to proxy list file that would be used
for routing HTTP traffic. A proxy from the
list will be chosen at random for each
request. Slows total runtime
--proxy TEXT Proxy address to route HTTP traffic through.
Slows total runtime
-w, --wordlist TEXT Path to wordlist that would be used for URL
fuzzing
-T, --threads INTEGER Number of threads to use for URL
Fuzzing/Subdomain enumeration. Default: 25
--ignored-response-codes TEXT Comma separated list of HTTP status code to
ignore for fuzzing. Defaults to:
302,400,401,402,403,404,503,504
--subdomain-list TEXT Path to subdomain list file that would be
used for enumeration
-S, --scripts Run Nmap scan with -sC flag
-s, --services Run Nmap scan with -sV flag
-f, --full-scan Run Nmap scan with both -sV and -sC
-p, --port TEXT Use this port range for Nmap scan instead of
the default
--tls-port INTEGER Use this port for TLS queries. Default: 443
--skip-health-check Do not test for target host availability
-fr, --follow-redirects Follow redirects when fuzzing. Default: True
--no-url-fuzzing Do not fuzz URLs
--no-sub-enum Do not bruteforce subdomains
-q, --quiet Do not output to stdout
-o, --outdir TEXT Directory destination for scan output
--help Show this message and exit.

Screenshots

HTB challenge example scan:




Results folder tree after a scan:



Related articles
  1. Github Hacking Tools
  2. Pentest Tools Kali Linux
  3. Hacking Tools Name
  4. Pentest Tools Linux
  5. Pentest Tools Framework
  6. Hacking Tools
  7. Pentest Tools Bluekeep
  8. Hak5 Tools
  9. Hacking App
  10. What Are Hacking Tools
  11. Hack Tools For Windows
  12. Usb Pentest Tools
  13. Hacking Tools Windows
  14. Hack Tools For Games
  15. Hacking Tools Hardware
  16. Pentest Tools Apk
  17. Top Pentest Tools
  18. Pentest Tools Windows
  19. Pentest Tools Download
  20. Hacking Tools For Windows
  21. Pentest Tools Nmap
  22. Pentest Tools Website
  23. Pentest Tools For Android
  24. Hacker Tools For Pc
  25. Hacking Tools For Windows
  26. New Hack Tools
  27. Hack Tools 2019
  28. Hak5 Tools
  29. Hacker
  30. How To Make Hacking Tools
  31. Pentest Tools Bluekeep
  32. Hack Tools Mac
  33. Hacking Tools 2020
  34. Pentest Recon Tools
  35. Easy Hack Tools
  36. Hacking Tools Software
  37. Pentest Tools Kali Linux
  38. Hacker Security Tools
  39. Hacking Tools 2019
  40. Hack Tools For Windows
  41. Hack Tool Apk
  42. Pentest Tools Nmap
  43. Best Hacking Tools 2019
  44. Hacker Tools For Ios
  45. Hacker Tools Apk Download
  46. Pentest Tools Alternative
  47. Pentest Box Tools Download
  48. Tools For Hacker
  49. Hacker Tools
  50. Beginner Hacker Tools
  51. What Is Hacking Tools
  52. Hack Tools
  53. Hacker Tools Windows
  54. Hack App
  55. Hack Tools For Mac
  56. Pentest Tools Website
  57. Hacker Tools For Pc
  58. Hacker Tools For Ios
  59. Best Hacking Tools 2019
  60. Hacker Tools Windows
  61. Nsa Hacker Tools
  62. Hacker Tools Online
  63. World No 1 Hacker Software
  64. Hacker Tools Github
  65. Hacking Tools Name
  66. Hacking Tools Software
  67. Hacker Tools For Windows
  68. Hacking Tools Windows 10
  69. Hack Tools For Mac
  70. Pentest Reporting Tools
  71. Hacking Tools Github
  72. Hacker Hardware Tools
  73. Pentest Tools Website
  74. Hack Tools Mac
  75. Hacking Tools Free Download
  76. Underground Hacker Sites
  77. Pentest Tools Subdomain
  78. Hacking Apps
  79. Hacking Tools For Windows 7
  80. Hack Website Online Tool
  81. Hackers Toolbox
  82. Hack Website Online Tool
  83. Best Hacking Tools 2019
  84. Hacking Tools Pc
  85. Hacking Tools For Windows Free Download
  86. Hacker Tools Apk Download
  87. Hacker Tools Windows
  88. Hacking Tools Github
  89. Physical Pentest Tools
  90. Hacking Tools Windows 10
  91. Hacker Tools Mac
  92. Pentest Tools Website
  93. Pentest Box Tools Download
  94. Pentest Tools Url Fuzzer
  95. World No 1 Hacker Software
  96. Pentest Tools For Windows
  97. Hacking Tools Usb
  98. Hackrf Tools
  99. Best Hacking Tools 2020
  100. Hack Tools For Ubuntu
  101. Pentest Tools Url Fuzzer
  102. How To Make Hacking Tools
  103. Hacking Tools For Pc
  104. Hacker Tools Windows
  105. Pentest Tools Url Fuzzer
  106. Hacker Tools
  107. Hack Tools For Pc
  108. Pentest Tools Framework
  109. What Is Hacking Tools
  110. Hacker Tools
  111. Hackers Toolbox
  112. Hack Tools
  113. Hacker Hardware Tools
  114. Hacking Tools For Windows Free Download
  115. Pentest Tools Port Scanner
  116. Pentest Tools Windows
  117. Hack Tools Github
  118. Pentest Tools Apk
  119. Hacking Tools For Pc
  120. Pentest Tools Android
  121. Best Pentesting Tools 2018
  122. Hacking Tools 2019
  123. Hacker
  124. Hacker Hardware Tools
  125. Termux Hacking Tools 2019
  126. Underground Hacker Sites
  127. Top Pentest Tools
  128. Hack Tools Download
  129. Hacker Tools Mac
  130. Hack Tools For Windows
  131. Pentest Tools Port Scanner
  132. Hacker Tools Free
  133. What Is Hacking Tools
  134. Pentest Recon Tools
  135. Hacking Apps
  136. Blackhat Hacker Tools
  137. Hack Tools
  138. Hack And Tools
  139. Hacks And Tools
  140. Hacker Techniques Tools And Incident Handling
  141. Game Hacking
  142. Hack And Tools
  143. Pentest Tools For Android
  144. Android Hack Tools Github
  145. Github Hacking Tools
  146. Hacker Security Tools
  147. Hacker Tools Github
  148. Hacker Tools Software
  149. Hacker Tools Hardware
  150. Black Hat Hacker Tools
  151. Hacking Tools For Beginners
  152. Hacking Tools Free Download
  153. Hacking Tools For Windows 7
  154. Hacker Tools For Mac
  155. Pentest Tools Apk
  156. Tools Used For Hacking
  157. Hacker Tools Linux
  158. Wifi Hacker Tools For Windows
  159. Hacks And Tools
  160. Pentest Tools Bluekeep
  161. Hacks And Tools
  162. What Is Hacking Tools
  163. Hacking Tools Windows
  164. Hacker Tools Mac
  165. How To Make Hacking Tools
  166. Pentest Reporting Tools
  167. Pentest Tools List
  168. Hacking Tools Hardware
  169. Hacker Tools For Windows
  170. Growth Hacker Tools
  171. Pentest Tools For Mac
  172. Hack Tools For Ubuntu
  173. Pentest Tools Bluekeep
  174. Hacking Tools Windows
  175. Usb Pentest Tools
  176. How To Make Hacking Tools