madusec

16.08.2017 08:00 exploit


Domain Password Audit Tool (DPAT)

This is a python script that will generate password use statistics from password hashes dumped from a domain controller and a password crack file such as oclHashcat.pot generated from the oclHashcat tool during password cracking. The report is an HTML report with clickable links.


madusec

16.08.2017 08:00 exploit


Exploit toolkit CVE-2017-8570: RCE

Exploit toolkit CVE-2017-8570 – v1.0 is a handy python script which provides pentesters

and security researchers a quick and effective way to exploit Microsoft Office PPSX RCE. It could generate a malicious PPSX file and deliver metasploit / meterpreter / other payload to user without any complex configuration.



madusec

16.08.2017 08:00 exploit


Nettacker: Automated Penetration Testing Framework

Nettacker project was created to automated for information gathering, vulnerability scanning and eventually generating report for networks, including services, bugs, vulnerabilities, misconfigurations and information. This software is able to use SYN, ACK, TCP, ICMP and many other protocols to detect and bypass the Firewalls/IDS/IPS and devices. By using a unique solution in Nettacker to find protected services such as SCADA We could make a point to be one of the bests of scanners, and be a good competitor of Nmap scanner but I also preparing a .nse module for make users able to use Nmap instead of Nettacker python version.


madusec

16.08.2017 08:00 exploit


Operative Framework

This is a framework based on fingerprint action, this tool is used for get information on a website or a enterprise target with multiple modules (Viadeo search,Linkedin search, Reverse email whois, Reverse ip whois, SQL file forensics …)


madusec

16.08.2017 08:00 exploit


PowerMemory: exploit the credentials present in files and memory

What’s New? The method is totally new. It proves that it can be extremely easy to get credentials or any other information from Windows memory without needing to code in C-type languages. In addition, with this method we can modify the user land and kernel land behavior without being caught by antivirus or new defending techniques. It can actually be done with 4GL language-type or with a script language like PowerShell which is installed everywhere.



1 2 Next

If you wish to support this blog, please consider clicking start for a little bit. Thanks!
Loading...