• Skip to main content
  • Skip to primary sidebar
  • Skip to secondary sidebar
  • Skip to footer
  • Google Dorks
  • Shodan Queries
  • Malware Sources
  • Privacy Policy

PenTestIT

Your source for all things Information Security!

You are here: Home / 2017 / Archives for May 2017

Archives for May 2017

HatCloud: Identify CloudFlare Protected IP Addresses!

Posted: 6 years ago by @pentestit 10705 views

HatCloud

This short post is about HatCloud, an open source tool coded in Ruby that helps you find the IP addresses of websites that are protected by CloudFlare. You know why would you need the real IP addresses right? The tool is quiet simple, needs just net/http, open-uri, json, socket and optparse. It leverages CrimeFlare to get the IP address behind CloudFlare and then Read more about HatCloud: Identify CloudFlare Protected IP Addresses!

[SHORT POST] InjectProc: Process Injection Techniques!

Posted: 6 years ago by @pentestit 10591 views
Updated: May 29, 2017 at 8:29 am

InjectProc

Process injection is an old technique used for hiding code execution, avoiding detection and bypassing security solutions by injecting into whitelisted processes. This is a short post about InjectProc, an open source project that demonstrates the following common process injection techniques: DLL injection: Works by opening the target process, allocates space and then Read more about [SHORT POST] InjectProc: Process Injection Techniques!

RouterSploit: The Metasploit For Routers!

Posted: 6 years ago by @pentestit 29140 views
Updated: July 3, 2017 at 3:59 am

RouterSploit

There are exploitation frameworks and then there is Metasploit. Though it has a few modules targeted towards embedded devices, it is your "general purpose" framework. If you are looking at a comprehensive embedded devices/router exploitation framework you now have RouterSploit! Read more about RouterSploit: The Metasploit For Routers!

Luckystrike: An Malicious Office Document Generator!

Posted: 6 years ago by @pentestit 13858 views

Luckystrike

Close on the heels of my earlier post about MicroSploit, the Microsoft Office Exploitation Toolkit, that was on the *NIX platform, this post is about Luckystrike, a malicious Microsoft Office malicious document generator on Microsoft's very own Windows platform. Read more about Luckystrike: An Malicious Office Document Generator!

WPXF: The WordPress Exploit Framework!

Posted: 6 years ago by @pentestit 27338 views
Updated: May 24, 2017 at 9:34 pm

WordPress Exploit Framework v1.8

My last post about WordPress security was WPSeku, the simple WordPress security scanner. This post is about WPXF, short for the WordPress Exploit Framework, which will help you go one step further and perform penetration tests on WordPress powered websites. Read more about WPXF: The WordPress Exploit Framework!

Next Page »

Primary Sidebar

Search

  • Email
  • Facebook
  • GitHub
  • Twitter

More to See

UPDATE: Merlin v0.9.0

September 15, 2020 By Black

UPDATE: Kali Linux 2020.3 Release

August 27, 2020 By Black

Popular Posts

  • UPDATE: Empire 3.0.1 23 views
  • List of Adversary Emulation Tools 22 views
  • UPDATE: Covenant v0.5 21 views
  • UPDATE: Kali Linux 2020.1 Release 18 views
  • List of Open Source C2 Post-Exploitation Frameworks 18 views
  • UPDATE: Empire 3.2.3 14 views
  • UPDATE: Infection Monkey 1.7.0 12 views
  • UPDATE: FudgeC2 0.5.4 10 views
  • UPDATE: Prowler 2.0 Beta 9 views
  • List of Operating Systems for OSINT (Open-Source Intelligence) 9 views

Secondary Sidebar

Categories

  • Docker Security
  • Fuzzing
  • Malware Analysis
  • Offensive Security
  • Open Source
  • OSINT
  • Penetration Testing
  • Reverse Engineering
  • Site News
  • Tool Updates
  • Tools
  • Vulnerability Assessment
  • Web Application Security
  • Wireless

Archives

  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • December 2018
  • November 2018
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017

Footer

Featured Post

MBRFilter: A Tool To Protect Against MBR Infection!

July 2, 2017 By Black

With the recent spread of a malware which the industry is calling by many names – Petya, NotPetya, Pnyetya and what not! One thing is for sure though – it rewrites your Master Boot Record (MBR) to render your system unusable. One of the many ways to avoid this from happening is by using MBRFilter fromRead more about MBRFilter: A Tool To Protect Against MBR Infection!

Recent

  • UPDATE: Empire v3.4.0
  • UPDATE: Merlin v0.9.0
  • UPDATE: Kali Linux 2020.3 Release
  • UPDATE: FudgeC2 0.5.7
  • UPDATE: PoshC2 v6.0

Tags

Adversary Emulation (18) Anchore (9) APT2 (15) Brute Force (15) CALDERA (9) Cross-Site Scripting (8) cuc (11) docker (34) docker scan (10) dockerscan (12) Empire (11) Empire Project (10) Infection Monkey (7) Invoke-Phant0m (8) Kali Linux (25) malware analysis (9) man-in-the-middle (8) Metasploit (32) Microsoft Windows (38) Mimikatz (28) MITRE ATT&CK™ (20) Nmap (34) open source (109) OSINT (14) OSRFramework (17) OWASP (13) OWASP Dependency-Check (14) penetration testing (26) penetration testing toolkit (25) post-exploitation (27) PowerShell (42) python (73) Raspberry Pi (10) RedSnarf (13) Responder (14) Shodan (7) Short Post (10) software composition analysis (13) SQL injection (10) Sysdig Falco (9) vulnerability assessment (21) Web Application Security (20) WiFi (12) Wireshark (11) WordPress (9)

Copyright © 2023 - PenTestIT | Information shared to be used for LEGAL purposes only!