Ghost Phisher – Phishing Attack Tool With GUI

Ghost Phisher is a Wireless and Ethernet security auditing and phishing attack tool written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy. The tool comes with a fake DNS server, fake DHCP server, fake HTTP server and also has an integrated area […]

The post Ghost…

Read the full post at darknet.org.uk

Continue reading Ghost Phisher – Phishing Attack Tool With GUI

Another Week Another Mass Domain Hijacking

Following shortly after the .io domain cock-up that left thousands vulnerable to domain hijacking, this week more than 750 domains were jacked via registrar Gandi. Seems like some pretty sloppy administration going on, but that’s how business goes sadly security is still a very much reactive trade. People don’t enable strict controls and audit…

Read the full post at darknet.org.uk

Continue reading Another Week Another Mass Domain Hijacking

Bluto – DNS Recon, Zone Transfer & Brute Forcer

Bluto is a Python-based tool for DNS recon, DNS zone transfer testing, DNS wild card checks, DNS brute forcing, e-mail enumeration and more. The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them […]

The…

Read the full post at darknet.org.uk

Continue reading Bluto – DNS Recon, Zone Transfer & Brute Forcer

Bluto – DNS Recon, Zone Transfer & Brute Forcer

Bluto is a Python-based tool for DNS recon, DNS zone transfer testing, DNS wild card checks, DNS brute forcing, e-mail enumeration and more. The target domain is queried for MX and NS records. Sub-domains are passively gathered via NetCraft. The target domain NS records are each queried for potential Zone Transfers. If none of them […]

The…

Read the full post at darknet.org.uk

Continue reading Bluto – DNS Recon, Zone Transfer & Brute Forcer

dork-cli – Command-line Google Dork Tool

dork-cli is a Python-based command-line Google Dork Tool to perform searches againsts Google’s custom search engine. A command-line option is always good as it allows you to script it in as part of your automated pen-testing suite. It will return a list of all the unique page results it finds, optionally filtered by a set […]

The post…

Read the full post at darknet.org.uk

Continue reading dork-cli – Command-line Google Dork Tool

DJI Firmware Hacking Removes Drone Flight Restrictions

Drones have been taking over the world, everyone with a passing interest in making videos has one and DJI firmware hacking gives you the ability to remove all restrictions (no-fly zones, height and distance) which under most jurisdictions is illegal (mostly EU and FAA for the US). It’s an interesting subject, and also a controversial…

Read the full post at darknet.org.uk

Continue reading DJI Firmware Hacking Removes Drone Flight Restrictions

T50 – The Fastest Mixed Packet Injector Tool

T50 (f.k.a. F22 Raptor) is a high performance mixed packet injector tool designed to perform Stress Testing. The concept started on 2001, right after release ‘nb-isakmp.c‘, and the main goal was to have a tool to perform TCP/IP protocol fuzzing, covering common regular protocols, such as: ICMP, TCP and UDP. Why Stress Testing? Why Stress…

Read the full post at darknet.org.uk

Continue reading T50 – The Fastest Mixed Packet Injector Tool

PenTools – Penetration Testing Tools Bundle

PenTools is a bundle of Python and Bash penetration testing tools for the recon and information gathering stage of a PT or VA. They are fairly simple scripts but might be interesting if you are new and want to see how some things are done, or how things can be automated using Python or Bash. […]

The post PenTools – Penetration Testing…

Read the full post at darknet.org.uk

Continue reading PenTools – Penetration Testing Tools Bundle

GnuPG Crypto Library libgcrypt Cracked Via Side-Channel

Some clever boffins including Internet software pioneer djb have gotten libgcrypt cracked via a Side-Channel attack which has to do with the direction of a sliding window carried out in the library. Patches have already been released so update your Lin… Continue reading GnuPG Crypto Library libgcrypt Cracked Via Side-Channel

OpenPuff – Professional Steganography Tool

OpenPuff is a professional steganography tool, with unique features you won’t find among any other free or commercial software. OpenPuff is 100% free and suitable for highly sensitive data covert transmission. The tool contains deniable steganography, carrier chains, unique layers of security and obfuscation, multiple carrier formats, is portable…

Read the full post at darknet.org.uk

Continue reading OpenPuff – Professional Steganography Tool