tg-z / web-clip

24 stars 5 forks source link

Hacking Tools 1 - Darknet #66

Open tg-z opened 4 years ago

tg-z commented 4 years ago

Hacking Tools 1 - Darknet set Restriction

Navigation

Darknet Hacking Tools, Hacker News & Cyber Security

Home

Top Nav

Return to Content

The Latest Hacking Tools

Hacking Tools are pieces of software or programs created to help you with hacking or that users can utilise for hacking purposes. Examples include Wep0ff – Wifi Cracking Tool, Brutus Password Cracker, wwwhack Web Hacking, THC-Hydra Network Login Hacking and pwdump/fgdump Windows Password Dumping Tools. More on Wikipedia. You can find the latest and best hacking tools below.

Script Kiddie Hacking Tools

There are various tools that are classified as too easy to use, or too automated and these fall into the category of Script Kiddie Tools. These are people who just follow instructions from a manual or tutorial without really understanding the technology or process happening. Examples of these tools would mainly be password cracking tools like Cain and Abel Password Cracker, Brutus Password Cracker and John the Ripper for Password Cracking.

Find the Best Hacking Tools from 2019 here:

Stardox – Github Stargazers Information Gathering Tool

Last updated: August 28, 2019 | 1,913 views 0

Stardox is a Python-based GitHub stargazers information gathering tool, it scrapes Github for information and displays them in a list tree view. It can be used for collecting information about your or someone else’s repository stargazers details. GitHub allows visitors to star a repo to bookmark it for later perusal. Stars represent a casual interest […]

Share111

Tweet

Share

Share

Buffer6

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=Stardox%20-%20Github%20Stargazers%20Information%20Gathering%20Tool&body=Stardox%20is%20a%20Python-based%20GitHub%20stargazers%20information%20gathering%20tool%2C%20it%20scrapes%20Github%20for%20information%20and%20displays%20them%20in%20a%20list%20tree%20view.%20It%20can%20be%20used%20for%20collecting%20information%20about%20your%20or%20someone%20else%27s%20repository%20stargazers%20details.%20GitHub%20allows%20visitors%20to%20star%20a%20repo%20to%20bookmark%20it%20for%20later%20perusal.%20Stars%20represent%20a%20casual%20interest%20in%20a%20repo%2C%20and%20when%20enough%20of%20them%20accumulate%2C%20it%27s%20natural%20to%20wonder%20what%27s%20driving%20interest.%20Stargazers%20attempts%20to%20get%20a%20handle%20on%20who%20these%20users%20are%20by%20finding%20out%20what%20else%20they%27ve%20starred%2C%20which%20other%20repositories%20they%27ve%20contributed%20to%2C%20and%20who%27s%20following%20them%20on%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F08%2Fstardox-github-stargazers-information-gathering-tool%2F)

117 Shares

Topic: Hacking Tools

RandIP – Network Mapper To Find Servers

Last updated: July 27, 2019 | 3,297 views 1

RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH. RandIP – Network Mapper Features HTTP and HTTPS enumeration Python enumeration exploits SSH enumeration exploits Logger and error-code handler SSH and Telnet Timeouts to […]

Share104

Tweet

Share

Share

Buffer13

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=RandIP%20-%20Network%20Mapper%20To%20Find%20Servers&body=RandIP%20is%20a%20nim-based%20network%20mapper%20application%20that%20generates%20random%20IP%20addresses%20and%20uses%20sockets%20to%20test%20whether%20the%20connection%20is%20valid%20or%20not%20with%20additional%20tests%20for%20Telnet%20and%20SSH.RandIP%20-%20Network%20Mapper%20FeaturesHTTP%20and%20HTTPS%20enumerationPython%20enumeration%20exploitsSSH%20enumeration%20exploitsLogger%20and%20error-code%20handlerSSH%20and%20Telnet%20Timeouts%20to%20prevent%20blockingSSH%20Enumerations%20work%20in%20tandemYou%20can%20download%20RandIP%20here%3Arandip-master.zipOr%20read%20more%20here.%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F07%2Frandip-network-mapper-to-find-servers%2F)

117 Shares

Topic: Networking Hacking

Slurp – Amazon AWS S3 Bucket Enumerator

Last updated: July 1, 2019 | 4,230 views

Slurp is a blackbox/whitebox S3 bucket enumerator written in Go that can use a permutations list to scan from an external perspective or an AWS API to scan internally. There are two modes that this tool operates at; blackbox and whitebox mode. Whitebox mode (or internal) is significantly faster than blackbox (external) mode. Blackbox (external) […]

Share262

Tweet

Share

Share

Buffer19

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=Slurp%20-%20Amazon%20AWS%20S3%20Bucket%20Enumerator&body=Slurp%20is%20a%20blackbox%2Fwhitebox%20S3%20bucket%20enumerator%20written%20in%20Go%20that%20can%20use%20a%20permutations%20list%20to%20scan%20from%20an%20external%20perspective%20or%20an%20AWS%20API%20to%20scan%20internally.%20There%20are%20two%20modes%20that%20this%20tool%20operates%20at%3B%20blackbox%20and%20whitebox%20mode.%20Whitebox%20mode%20%28or%20internal%29%20is%20significantly%20faster%20than%20blackbox%20%28external%29%20mode.%20Blackbox%20%28external%29%20In%20this%20mode%2C%20you%20are%20using%20the%20permutations%20list%20to%20conduct%20scans.%20It%20will%20return%20false%20positives%20and%20there%20is%20NO%20WAY%20to%20link%20the%20buckets%20to%20an%20actual%20AWS%20account.%20Whitebox%20%28internal%29%20In%20this%20mode%2C%20you%20are%20using%20the%20AWS%20API%20with%20credentials%20on%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F07%2Fslurp-amazon-aws-s3-bucket-enumerator%2F)

281 Shares

Topic: Hacking Tools

BloodHound – Hacking Active Directory Trust Relationships

Last updated: June 24, 2019 | 3,984 views

BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended relationships within an Active Directory environment. Attackers can use BloodHound to easily identify highly complex attack paths that would otherwise be impossible to quickly identify. Defenders can use it to identify and eliminate those same […]

Share286

Tweet

Share

Share

Buffer17

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=BloodHound%20-%20Hacking%20Active%20Directory%20Trust%20Relationships&body=BloodHound%20is%20for%20hacking%20active%20directory%20trust%20relationships%20and%20it%20uses%20graph%20theory%20to%20reveal%20the%20hidden%20and%20often%20unintended%20relationships%20within%20an%20Active%20Directory%20environment.%20Attackers%20can%20use%20BloodHound%20to%20easily%20identify%20highly%20complex%20attack%20paths%20that%20would%20otherwise%20be%20impossible%20to%20quickly%20identify.%20Defenders%20can%20use%20it%20to%20identify%20and%20eliminate%20those%20same%20attack%20paths.%20Both%20blue%20and%20red%20teams%20can%20use%20BloodHound%20to%20easily%20gain%20a%20deeper%20understanding%20of%20privilege%20relationships%20in%20an%20Active%20Directory%20environment.%20It%20is%20a%20single%20page%20JavaScript%20web%20application%2C%20built%20on%20top%20of%20Linkurious%2C%20compiled%20with%20Electron%2C%20with%20a%20Neo4j%20database%20fed%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F06%2Fbloodhound-hacking-active-directory-trust-relationships%2F)

303 Shares

Topic: Hacking Tools

SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells

Last updated: April 30, 2019 | 9,255 views

SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box […]

Share291

Tweet

Share

Share

Buffer8

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=SecLists%20-%20Usernames%2C%20passwords%2C%20URLs%2C%20sensitive%20data%20patterns%2C%20fuzzing%20payloads%2C%20web%20shells&body=SecLists%20is%20the%20security%20tester%27s%20companion.%20It%27s%20a%20collection%20of%20multiple%20types%20of%20lists%20used%20during%20security%20assessments%2C%20collected%20in%20one%20place.%20List%20types%20include%20usernames%2C%20passwords%2C%20URLs%2C%20sensitive%20data%20patterns%2C%20fuzzing%20payloads%2C%20web%20shells%2C%20and%20many%20more.%20The%20goal%20is%20to%20enable%20a%20security%20tester%20to%20pull%20this%20repository%20onto%20a%20new%20testing%20box%20and%20have%20access%20to%20every%20type%20of%20list%20that%20may%20be%20needed.%20Contents%20of%20SecLists%20Each%20section%20has%20tonnes%20of%20content%20including%20the%20below%3A%20Discovery%20lists%20%28DNS%2C%20SNMP%2C%20Web%20content%29%20Fuzzing%20Payloads%20%28Databases%2C%20LFI%2C%20SQLi%2C%20XSS%29%20Password%20lists%20%28Common%20credentials%2C%20cracked%20hashes%2C%20honeypot%20captures%2C%20leaked%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F04%2Fseclists-usernames-passwords-urls-sensitive-data-patterns-fuzzing-payloads-web-shells%2F)

299 Shares

Topic: Hacking Tools

GoBuster – Directory/File & DNS Busting Tool in Go

Last updated: February 25, 2019 | 7,649 views

GoBuster is a Go-based tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (with wildcard support) – essentially a directory/file & DNS busting tool. The author built YET ANOTHER directory and DNS brute forcing tool because he wanted.. … something that didn’t have a fat Java GUI (console FTW). … […]

Share283

Tweet

Share

Share

Buffer5

WhatsApp

Reddit

Flip

Vote

[Email](mailto:?subject=GoBuster%20-%20Directory%2FFile%20%26%20DNS%20Busting%20Tool%20in%20Go&body=GoBuster%20is%20a%20Go-based%20tool%20used%20to%20brute-force%20URIs%20%28directories%20and%20files%29%20in%20web%20sites%20and%20DNS%20subdomains%20%28with%20wildcard%20support%29%20-%20essentially%20a%20directory%2Ffile%20%26%20DNS%20busting%20tool.%20The%20author%20built%20YET%20ANOTHER%20directory%20and%20DNS%20brute%20forcing%20tool%20because%20he%20wanted..%20...%20something%20that%20didn%27t%20have%20a%20fat%20Java%20GUI%20%28console%20FTW%29.%20...%20to%20build%20something%20that%20just%20worked%20on%20the%20command%20line.%20...%20something%20that%20did%20not%20do%20recursive%20brute%20force.%20...%20something%20that%20allowed%20me%20to%20brute%20force%20folders%20and%20multiple%20extensions%20at%20once.%20...%20something%20that%20compiled%20to%20native%20on%20multiple%20platforms.%20...%20something%20that%0D%0A%0D%0ARead More Here: %20https%3A%2F%2Fwww.darknet.org.uk%2F2019%2F02%2Fgobuster-directory-file-dns-busting-tool-in-go%2F)

288 Shares

Topic: Hacking Tools

1 2135 Next →

Search Darknet

Advertisements

Advertise on Darknet

Topics

© 2019 Darknet. All Rights Reserved.

Privacy Policy

Add Tags ?

AddDeleteNo

close

close

Majboor commented 1 year ago

how is this tool? https://github.com/Tech-Realm/The-Exploiter