Tools and Scripts

This page links to various tools and scripts which might be useful when attempting a target or automizing different tasks. Open-source software only!
Back to Main

"WFuzz" is a web application security fuzzer tool and library for Python. A payload in "Wfuzz" is a source of data.
This simple concept allows any input to be injected in any field of an HTTP request, allowing to perform complex web security attacks in different web application components such as: parameters, authentication, forms, directories/files, headers, etc.
Incredibly fast crawler designed for OSINT. Gobuster is a tool used to brute-force:

- URIs (directories and files) in web sites.
- DNS subdomains (with wildcard support).
sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.
testssl.sh is a free command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws.WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.This PHP Shell is a useful tool for system or web administrator to do remote management without using cpanel, connecting using ssh, ftp etc. All actions take place within a web browser.Subjack is a Subdomain Takeover tool written in Go designed to scan a list of subdomains concurrently and identify ones that are able to be hijacked.
With Go's speed and efficiency, this tool really stands out when it comes to mass-testing. Always double check the results manually to rule out false positives.
A .DS_Store file disclosure exploit.
It parses .DS_Store file and downloads files recursively.
Extracting URLs of a specific target based on the results of "commoncrawl.org" Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis.WhatWeb identifies websites. Its goal is to answer the question, "What is that Website?". WhatWeb recognises web technologies including content management systems (CMS), blogging platforms, statistic/analytics packages, JavaScript libraries, web servers, and embedded devices. WhatWeb has over 1800 plugins, each to recognise something different. WhatWeb also identifies version numbers, email addresses, account IDs, web framework modules, SQL errors, and more.
WFuzz https://github.com/xmendez/wfuzz
Photon https://github.com/s0md3v/Photon
Gobuster https://github.com/OJ/gobuster
sqlmap https://github.com/sqlmapproject/sqlmap
testssl.sh https://github.com/drwetter/testssl.sh
WPScan https://github.com/wpscanteam/wpscan
b374k https://github.com/b374k/b374k
Subjack https://github.com/haccer/subjack
ds_store_exp https://github.com/lijiejie/ds_store_exp
cc.py https://github.com/si9int/cc.py
ScreenShooter https://github.com/si9int/ScreenShooter
WhatWeb https://github.com/urbanadventurer/WhatWeb