PenBox – A Penetration Testing Framework

on

A Penetration Testing Framework , The Hacker’s Repo our hope is in the last version we will have evry script that a hacker needs Information Gathering :

  • nmap
  • Setoolkit
  • Port Scanning
  • Host To IP
  • wordpress user enumeration
  • CMS scanner
  • XSStracer – checks remote web servers for Clickjacking, Cross-Frame Scripting, Cross-Site Tracing and Host Header Injection
  • Doork – Google Dorks Passive Vulnerability Auditor
  • Scan A server’s Users

Password Attacks :

  • Cupp
  • Ncrack
  • AutoBrowser Screenshot

Wireless Testing :

  • reaver
  • pixiewps
  • Bluetooth Honeypot GUI Framework

Exploitation Tools :

  • Venom
  • sqlmap
  • Shellnoob
  • commix
  • FTP Auto Bypass
  • jboss-autopwn
  • Blind SQL Automatic Injection And Exploit
  • Bruteforce the Android Passcode given the hash and salt
  • Joomla, Mambo, PHP-Nuke, and XOOPS CMS SQL injection Scanner
  • cms Few
  • BLACKBOx
  • Liffy

Sniffing & Spoofing :

  • Setoolkit
  • SSLtrip
  • pyPISHER
  • SMTP Mailer

Web Hacking :

  • Drupal Hacking
  • Inurlbr
  • WordPress & Joomla Scanner
  • Gravity Form Scanner
  • File Upload Checker
  • WordPress Exploit Scanner
  • WordPress Plugins Scanner
  • Shell and Directory Finder
  • Joomla! 1.5 – 3.4.5 remote code execution
  • Vbulletin 5.X remote code execution
  • BruteX – Automatically brute force all services running on a target
  • Arachni – Web Application Security Scanner Framework
  • Sub-domain Scanning
  • WordPress Scanning
  • WordPress Username Enumeration
  • WordPress Backup Grabbing
  • Sensitive File Detection
  • Same-Site Scripting Scanning
  • Click Jacking Detection
  • Powerful XSS vulnerability scanning
  • SQL Injection vulnerability scanning

#Private Tools

  • Get all websites
  • Get joomla websites
  • Get wordpress websites
  • Find control panel
  • Find zip files
  • Find upload files
  • Get server users
  • Scan from SQL injection
  • Scan ports (range of ports)
  • Scan ports (common ports)
  • Get server banner
  • Bypass Cloudflare

#Post Exploitation

  • Shell Checker
  • POET
  • Weeman – Phishing Framework
  • Insecure Web Interface
  • Insufficient Authentication/Authorization
  • Insecure Network Services
  • Lack of Transport Encryption
  • Privacy Concerns
  • Insecure Cloud Interface
  • Insecure Mobile Interface
  • Insufficient Security Configurability
  • Insecure Software/Firmware
  • Poor Physical Security
  • Radium-Keylogger – Python keylogger with multiple features

#Recon

  • Sniper

#Smartphones Penetration

  • Attach Framework to a Deployed Agent/Create Agent
  • Send Commands to an Agent
  • View Information Gathered
  • Attach Framework to a Mobile Modem
  • Run a remote attack
  • Run a social engineering or client side attack
  • Compile code to run on mobile devices
  • Install Stuff
  • Use Drozer
  • Setup API
  • Bruteforce the Android Passcode given the hash and salt

#Others

  • QrlJacking-Framework
  • Sniffles – Packet Capture Generator for IDS and Regular Expression Evaluation #Installation git clone

quick-download-media-file-image

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s