<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <docs>https://blogs.law.harvard.edu/tech/rss</docs>
    <title>Penetration testing tools on root4loot</title>
    <link>https://root4loot.com/pentools/</link>
    <description>Recent content in Penetration testing tools on root4loot</description>
    <image>
      <title>Penetration testing tools on root4loot</title>
      <link>https://root4loot.com/pentools/</link>
      <url>/img/opengraph.png</url>
    </image>
    <ttl>1440</ttl>
    <generator>After Dark 7.2.1 (Hugo 0.55.1)</generator>
    <language>en-US</language>
    
      <atom:link href="https://root4loot.com/pentools/index.xml" rel="self" type="application/rss+xml" />
    
    
      <item>
        <title>AV Evasion</title>
        <link>https://root4loot.com/pentools/av-evasion/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/av-evasion/</guid>
        <description>Veil
Python script designed to generate metasploit payloads that bypass common anti-virus solutions.
Usage: python Veil-Evasion.py  peCloak
Python script that takes an automated approach to AV evasion.
Usage: peCloak.py [[options]] [path_to_pe_file] Example: python peCloak.py plink.exe .. New file saved [plink_1540964122_cloaked.exe]  OWASP ZSC
Open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.
Usage: ./zsc zsc&amp;gt; help [&#43;] shellcode generate shellcode [&#43;] shellcode&amp;gt;generate	to generate shellcode [&#43;] shellcode&amp;gt;search	search for shellcode in shellstorm [&#43;] shellcode&amp;gt;download	download shellcodes from shellstorm [&#43;] shellcode&amp;gt;shell_storm_list	list all shellcodes in shellstorm [&#43;] obfuscate generate obfuscate code [&#43;] back Go back one step [&#43;] clear clears the screen [&#43;] help show help menu [&#43;] update check for update [&#43;] about about owasp zsc [&#43;] restart restart the software [&#43;] version software version [&#43;] exit/quit to exit the software [&#43;] # insert comment [&#43;] zsc -h, --help	basic interface help  </description>
        <content:encoded><![CDATA[Veil
Python script designed to generate metasploit payloads that bypass common anti-virus solutions.
Usage: python Veil-Evasion.py  peCloak
Python script that takes an automated approach to AV evasion.
Usage: peCloak.py [[options]] [path_to_pe_file] Example: python peCloak.py plink.exe .. New file saved [plink_1540964122_cloaked.exe]  OWASP ZSC
Open source software in Python language which lets you generate customized shellcodes and convert scripts to an obfuscated script.
Usage: ./zsc zsc&amp;gt; help [&#43;] shellcode generate shellcode [&#43;] shellcode&amp;gt;generate	to generate shellcode [&#43;] shellcode&amp;gt;search	search for shellcode in shellstorm [&#43;] shellcode&amp;gt;download	download shellcodes from shellstorm [&#43;] shellcode&amp;gt;shell_storm_list	list all shellcodes in shellstorm [&#43;] obfuscate generate obfuscate code [&#43;] back Go back one step [&#43;] clear clears the screen [&#43;] help show help menu [&#43;] update check for update [&#43;] about about owasp zsc [&#43;] restart restart the software [&#43;] version software version [&#43;] exit/quit to exit the software [&#43;] # insert comment [&#43;] zsc -h, --help	basic interface help  ]]></content:encoded>
      </item>
    
      <item>
        <title>Brute Force</title>
        <link>https://root4loot.com/pentools/brute-force/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/brute-force/</guid>
        <description>Ncrack
High-speed network authentication cracking tool.
Examples: SSH: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 22 RDP: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 3389 FTP: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 21  Medusa
Login brute-forcer tool designed to be speedy, parallel and modular.
It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.
Syntax: Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT] Examples: SSH: medusa -u testuser -P wordlist.</description>
        <content:encoded><![CDATA[Ncrack
High-speed network authentication cracking tool.
Examples: SSH: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 22 RDP: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 3389 FTP: ncrack -u testuser -P wordlist.txt &amp;lt;host&amp;gt; -p 21  Medusa
Login brute-forcer tool designed to be speedy, parallel and modular.
It supports many protocols: AFP, CVS, FTP, HTTP, IMAP, rlogin, SSH, Subversion, and VNC to name a few.
Syntax: Medusa [-h host|-H file] [-u username|-U file] [-p password|-P file] [-C file] -M module [OPT] Examples: SSH: medusa -u testuser -P wordlist.txt -h &amp;lt;host&amp;gt; -M ssh FTP: ncrack -u testuser -P wordlist.txt -T 5 &amp;lt;host&amp;gt; -M ftp RDP (pass-the-hash): medusa -M rdp -m PASS:HASH -h &amp;lt;host&amp;gt; -u someuser -p &amp;lt;NTLM_hash&amp;gt;  Spray
Password Spraying tool for Active Directory Credentials. Supports SMB, OWA, Lync, Cisco Web VPN.
 Usage: SMB: spray.sh -smb &amp;lt;targetIP&amp;gt; &amp;lt;usernameList&amp;gt; &amp;lt;passwordList&amp;gt; &amp;lt;AttemptsPerLockoutPeriod&amp;gt; &amp;lt;LockoutPeriodInMinutes&amp;gt; &amp;lt;DOMAIN&amp;gt; OWA: spray.sh -owa &amp;lt;targetIP&amp;gt; &amp;lt;usernameList&amp;gt; &amp;lt;passwordList&amp;gt; &amp;lt;AttemptsPerLockoutPeriod&amp;gt; &amp;lt;LockoutPeriodInMinutes&amp;gt; &amp;lt;RequestsFile&amp;gt; Lync: spray.sh -lync &amp;lt;targetIP&amp;gt; &amp;lt;usernameList&amp;gt; &amp;lt;passwordList&amp;gt; &amp;lt;AttemptsPerLockoutPeriod&amp;gt; &amp;lt;LockoutPeriodInMinutes&amp;gt; Examples: SMB: spray.sh -smb 192.168.0.1 users.txt passwords.txt 1 35 SPIDERLABS OWA: spray.sh -owa 192.168.0.1 users.txt passwords.txt 1 35 post-request.txt Lync: spray.sh -lync https://lyncdiscover.spiderlabs.com/ users.txt passwords.txt 1 35 Note: For POST requests, replace username and password values with &amp;quot;sprayuser&amp;quot; and &amp;quot;spraypassword&amp;quot;.  THC-Hydra
Parallelized login cracker which supports numerous protocols to attack.
It is very fast and flexible, and new modules are easy to add.
Syntax: hydra [[[-l LOGIN|-L FILE] [-p PASS|-P FILE]] | [-C FILE]] [-e nsr] [-o FILE] [-t TASKS] [-M FILE [-T TASKS]] [-w TIME] [-W TIME] [-f] [-s PORT] [-x MIN:MAX:CHARSET] [-c TIME] [-ISOuvVd46] [service://server[:PORT][/OPT]] Examples: SSH: hydra 10.10.10.1 -l testuser -P wordlist.txt -t 4 ssh RDP: hydra -V -l testuser -P wordlist.txt rdp://10.10.10.1 FTP: hydra 10.10.10.1 -V -l testuser -P wordlist.txt ftp SMB: hydra 10.10.10.1 -V -l testuser -P wordlist.txt smb POST form: hydra -l testuser -p wordlist.txt -e nsr 10.10.10.1 http-post-form &amp;quot;http://10.10.10.1/login.php:username=^USER^&amp;amp;password=^PASS^&amp;amp;submit=Login:&amp;lt;Error message&amp;gt;&amp;quot; -V  Patator
A great multi-purpose brute-forcer, with a modular design and a flexible usage.
Examples: FTP: patator ftp_login host=10.10.0.1 user=someUser password=FILE0 0=wordlist.txt SSH: patator ssh_login host=10.10.0.1 user=someUser password=FILE0 0=wordlist.txt  ]]></content:encoded>
      </item>
    
      <item>
        <title>Command &amp; Control</title>
        <link>https://root4loot.com/pentools/command-control/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/command-control/</guid>
        <description>dnscat2
Tool designed to create an encrypted command-and-control (C&amp;amp;C) channel over the DNS protocol, which is an effective tunnel out of almost every network.
Usage: ./dnscat  DropboxC2C
Post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
Structure: main.py - The &amp;quot;server&amp;quot; part which manages all the agents. agent.py - The &amp;quot;client&amp;quot; part which does what the server tells. 1. Modify the API Key on agent.py and main.py (the api key must be created from the dropbox web interface) 2.</description>
        <content:encoded><![CDATA[dnscat2
Tool designed to create an encrypted command-and-control (C&amp;amp;C) channel over the DNS protocol, which is an effective tunnel out of almost every network.
Usage: ./dnscat  DropboxC2C
Post-exploitation agent which uses Dropbox Infrastructure for command and control operations.
Structure: main.py - The &amp;quot;server&amp;quot; part which manages all the agents. agent.py - The &amp;quot;client&amp;quot; part which does what the server tells. 1. Modify the API Key on agent.py and main.py (the api key must be created from the dropbox web interface) 2. Run setup.bat on a Windows Machine. You will get agent.exe which is the &amp;quot;compiled&amp;quot; agent. 3. Run main.py and run the agent on the compromised server.  gcat
A stealthy Python based backdoor that uses Gmail as a command and control server.
See https://github.com/byt3bl33d3r/gcat  Merlin
Cross-platform post-exploitation HTTP/2 Command &amp;amp; Control server and agent written in golang.
Quick start guide: Server: https://github.com/Ne0nd0g/merlin/wiki/Server-Execution-Quick-Start-Guide Agent: https://github.com/Ne0nd0g/merlin/wiki/Agent-Execution-Quick-Start-Guide  ]]></content:encoded>
      </item>
    
      <item>
        <title>Databases</title>
        <link>https://root4loot.com/pentools/databases/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/databases/</guid>
        <description>NoSQLMap
Open source Python-based automated NoSQL MongoDB exploitation tool.
Usage: python NoSQLMap  SQLmap
Open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
Usage: python sqlmap [options] Examples: python sqlmap.py -u &amp;quot;http://targetsite.com/vuln.php&amp;quot; python sqlmap.py -u &amp;quot;http://targetsite.com/login.aspx&amp;quot; --method POST --data &amp;quot;username=foo&amp;amp;password=bar&amp;amp;submit=login&amp;quot; --dbms=mssql --tables  </description>
        <content:encoded><![CDATA[NoSQLMap
Open source Python-based automated NoSQL MongoDB exploitation tool.
Usage: python NoSQLMap  SQLmap
Open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers.
Usage: python sqlmap [options] Examples: python sqlmap.py -u &amp;quot;http://targetsite.com/vuln.php&amp;quot; python sqlmap.py -u &amp;quot;http://targetsite.com/login.aspx&amp;quot; --method POST --data &amp;quot;username=foo&amp;amp;password=bar&amp;amp;submit=login&amp;quot; --dbms=mssql --tables  ]]></content:encoded>
      </item>
    
      <item>
        <title>Miscellaneous</title>
        <link>https://root4loot.com/pentools/miscellaneous/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/miscellaneous/</guid>
        <description>httprobe
Take a list of domains and probe for working HTTP and HTTPS servers.
Example usage: cat domains.txt | httprobe | tee alive.txt cat domains.txt | httprobe -p http:8080 -p https:4443 | tee alive.txt  RTFM
RTFM (Red Team Field Manual) is a great and useful book, BUT a bit pointless when you have to transcribe it, so this little program will aim to be the spiritual successor to it.</description>
        <content:encoded><![CDATA[httprobe
Take a list of domains and probe for working HTTP and HTTPS servers.
Example usage: cat domains.txt | httprobe | tee alive.txt cat domains.txt | httprobe -p http:8080 -p https:4443 | tee alive.txt  RTFM
RTFM (Red Team Field Manual) is a great and useful book, BUT a bit pointless when you have to transcribe it, so this little program will aim to be the spiritual successor to it.
Update database: ./rtfm.py -u Search for something: ./rtfm.py -e &#39;Something&#39; Search by date: ./rtfm.py -A yyyy-mm-dd (or now/today) List all tags: ./rtfm.py -Dt -e (search for command): ./rtfm.py -pP -c &#39;sqlmap&#39; -t (search for tag): ./rtfm.py -pP -t xss  rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Example usage: rescope --burp -u bugcrowd.com/bugcrowd -o burpscope.json rescope --zap --name CoolScope -u bugcrowd.com/bugcrowd -o burpscope.context rescope --burp -i scopedefinitions.txt -o burpscope.json --silent  ]]></content:encoded>
      </item>
    
      <item>
        <title>Network Related</title>
        <link>https://root4loot.com/pentools/network-related/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/network-related/</guid>
        <description>Airgeddon
A multi-use bash script for Linux systems to audit wireless networks.
Usage: sudo bash airgeddon.sh SPARTA
Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
Usage: ./sparta  SSH
Pivoting with SSH.
Port forwarding: Local: ssh &amp;lt;gateway&amp;gt; -L &amp;lt;local port to listen&amp;gt;:&amp;lt;remote host&amp;gt;:&amp;lt;remote port&amp;gt; Remote: ssh &amp;lt;gateway&amp;gt; -R &amp;lt;remote port to bind&amp;gt;:&amp;lt;local host&amp;gt;:&amp;lt;local port&amp;gt; Dynamic: ssh &amp;lt;gateway&amp;gt; -D &amp;lt;port to bind&amp;gt;  Plink</description>
        <content:encoded><![CDATA[Airgeddon
A multi-use bash script for Linux systems to audit wireless networks.
Usage: sudo bash airgeddon.sh SPARTA
Python GUI application which simplifies network infrastructure penetration testing by aiding the penetration tester in the scanning and enumeration phase.
Usage: ./sparta  SSH
Pivoting with SSH.
Port forwarding: Local: ssh &amp;lt;gateway&amp;gt; -L &amp;lt;local port to listen&amp;gt;:&amp;lt;remote host&amp;gt;:&amp;lt;remote port&amp;gt; Remote: ssh &amp;lt;gateway&amp;gt; -R &amp;lt;remote port to bind&amp;gt;:&amp;lt;local host&amp;gt;:&amp;lt;local port&amp;gt; Dynamic: ssh &amp;lt;gateway&amp;gt; -D &amp;lt;port to bind&amp;gt;  Plink
Pivoting with Plink.exe (SSH for Windows).
Port forwarding: Local: plink.exe &amp;lt;gateway&amp;gt; -L &amp;lt;local port to listen&amp;gt;:&amp;lt;remote host&amp;gt;:&amp;lt;remote port&amp;gt; Remote: plink.exe &amp;lt;gateway&amp;gt; -R &amp;lt;remote port to bind&amp;gt;:&amp;lt;local host&amp;gt;:&amp;lt;local port&amp;gt; Dynamic: plink.exe &amp;lt;gateway&amp;gt; -D &amp;lt;port to bind&amp;gt;  Wifite 2
A tool to attack multiple WEP and WPA encrypted networks at the same time.
Example usage: ./Wifite.py -i wlan0 --wpa  WIFIPhisher
An automated phishing attack tool for Wifi networks.
Example usage: wifiphisher -i wlan0 -e &#39;Free Wifi&#39; -hC capture.pcap  ]]></content:encoded>
      </item>
    
      <item>
        <title>Printers</title>
        <link>https://root4loot.com/pentools/printers/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/printers/</guid>
        <description>Praedasploit
Contains a number of commonly found printer exploits.
Usage: See https://github.com/rapid7/metasploit-framework/wiki/Loading-External-Modules PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
Usage: ./pret.py [-h] [-s] [-q] [-d] [-i file] [-o file] target {ps,pjl,pcl} Example usage: ./pret.py laserjet.lan ps ./pret.py /dev/usb/lp0 pjl</description>
        <content:encoded><![CDATA[Praedasploit
Contains a number of commonly found printer exploits.
Usage: See https://github.com/rapid7/metasploit-framework/wiki/Loading-External-Modules PRET
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
Usage: ./pret.py [-h] [-s] [-q] [-d] [-i file] [-o file] target {ps,pjl,pcl} Example usage: ./pret.py laserjet.lan ps ./pret.py /dev/usb/lp0 pjl]]></content:encoded>
      </item>
    
      <item>
        <title>Samba</title>
        <link>https://root4loot.com/pentools/samba/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/samba/</guid>
        <description>CrackMapExec
A post-exploitation tool that helps automate assessing the security of large Active Directory networks. CME makes heavy use of the Impacket library.
Examples usage: crackmapexec &amp;lt;protocol&amp;gt; 192.168.1.0/24 crackmapexec &amp;lt;protocol&amp;gt; ~/targets.txt Pass-the-hash: crackmapexec smb &amp;lt;target(s)&amp;gt; -u username -H LMHASH:NTHASH crackmapexec smb &amp;lt;target(s)&amp;gt; -u username -H NTHASH Null sessions: crackmapexec smb &amp;lt;target(s)&amp;gt; -u &#39;&#39; -p &#39;&#39;  enum4linux
A Linux alternative to enum.exe for enumerating data from Windows and Samba hosts.</description>
        <content:encoded><![CDATA[CrackMapExec
A post-exploitation tool that helps automate assessing the security of large Active Directory networks. CME makes heavy use of the Impacket library.
Examples usage: crackmapexec &amp;lt;protocol&amp;gt; 192.168.1.0/24 crackmapexec &amp;lt;protocol&amp;gt; ~/targets.txt Pass-the-hash: crackmapexec smb &amp;lt;target(s)&amp;gt; -u username -H LMHASH:NTHASH crackmapexec smb &amp;lt;target(s)&amp;gt; -u username -H NTHASH Null sessions: crackmapexec smb &amp;lt;target(s)&amp;gt; -u &#39;&#39; -p &#39;&#39;  enum4linux
A Linux alternative to enum.exe for enumerating data from Windows and Samba hosts.
Usage: ./enum4linux.pl [options] ip Example: ./enum4linux.pl -U -o 192.168.1.200  nullinux
Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and users through SMB.
Usage: python3 nullinux.py -users -quick DC1.Domain.net python3 nullinux.py -all 192.168.0.0-5 python3 nullinux.py -shares -U &#39;Domain\User&#39; -P &#39;Password1&#39; 10.0.0.1,10.0.0.5  Responder
A LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.
Usage: ./Responder.py [options] Example: ./Responder.py -I eth0 -wrf  Smbexec
A rapid psexec style attack with samba tools.
Usage: ./smbexec Main menu: 1. System Enumeration 2. System Exploitation 3. Obtain Hashes 4. Options 5. Exit  Smbclient
FTP-like client to access SMB/CIFS resources on servers. Part of the Samba suite.
Example usage: Pass-the-hash: smbclient -U testuser%&amp;lt;nthash&amp;gt; --pw-nt-hash -L 192.168.0.1 smbclient \\\\192.168.0.1\\domain -U testuser%&amp;lt;nthash&amp;gt; --pw-nt-hash Map drives: smbclient \\\\192.168.0.1\\sharename$ smbclient \\\\192.168.0.1\\sharename$ -U root%  Wmiexec
A similar approach to smbexec but executing commands through WMI.
Usage: wmiexec.py [-h] [-share SHARE] [-nooutput] [-debug] [-codec CODEC] [-hashes LMHASH:NTHASH] [-no-pass] [-k] [-aesKey hex key] [-dc-ip ip address] [-A authfile] target [command [command ...]] Example: ./wmiexec.py -hashes &amp;lt;ntlmhash&amp;gt; Administrator@10.10.0.1  ]]></content:encoded>
      </item>
    
      <item>
        <title>Web related</title>
        <link>https://root4loot.com/pentools/web/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/web/</guid>
        <description>Arjun
Arjun is a HTTP parameter discovery suite.
Example usage: Find GET parameters: python3 arjun.py -u https://api.example.com/endpoint --get Find POST parameters python3 arjun.py -u https://api.example.com/endpoint --post Multi-threading: python3 arjun.py -u https://api.example.com/endpoint --get -t 22 Delay between requests: python3 arjun.py -u https://api.example.com/endpoint --get -d 2 Add HTTP headers: python3 arjun.py -u https://api.example.com/endpoint --get --headers  BeEF Exploitation Framework
A cross-site scripting (XSS) attack framework.
Usage: ./beef  Burp
An awesome graphical tool for testing Web application security.</description>
        <content:encoded><![CDATA[Arjun
Arjun is a HTTP parameter discovery suite.
Example usage: Find GET parameters: python3 arjun.py -u https://api.example.com/endpoint --get Find POST parameters python3 arjun.py -u https://api.example.com/endpoint --post Multi-threading: python3 arjun.py -u https://api.example.com/endpoint --get -t 22 Delay between requests: python3 arjun.py -u https://api.example.com/endpoint --get -d 2 Add HTTP headers: python3 arjun.py -u https://api.example.com/endpoint --get --headers  BeEF Exploitation Framework
A cross-site scripting (XSS) attack framework.
Usage: ./beef  Burp
An awesome graphical tool for testing Web application security.
Usage: see https://portswigger.net/burp/documentation/contents  CMSmap
Python open source CMS scanner that automates the process of detecting security flaws of the most popular CMSs.
Examples: cmsmap.py http://example.com cmsmap.py http://example.com -f W -F --noedb -d cmsmap.py http://example.com -i targets.txt -o output.txt cmsmap.py http://example.com -u admin -p passwords.txt cmsmap.py http://example.com -k hashes.txt -w passwords.txt  CORStest
A simple CORS misconfiguration scanner
Usage: corstest.py [arguments] infile Example usage: corstest.py hosts.txt  Gobuster
Directory/file &amp;amp; DNS busting tool written in Go.
Example usage: Standard dir bust: gobuster -u https://example.com -w /path/to/wordlist.txt -n Display content length: gobuster -u https://example.com -w /path/to/wordlist.txt -l Filter results based on status codes 200, 403: gobuster -u https://example.com -w /path/to/wordlist.txt -s &#39;200,403&#39; -e Filter results based on file extensions: gobuster -u https://example.com -w /path/to/wordlist.txt -x &#39;asp,aspx&#39;  SPartan
Frontpage and Sharepoint fingerprinting and attack tool.
Usage: python SPartan.py -u http://127.0.0.1 -f -c -u: host URL -c: crawl the site for links -f: perform frontpage scans --sps: discover sharepoint SOAP services  Parameth
This tool can be used to brute discover GET and POST parameters-
Usage example: ./parameth.py -u https://example.com/somepage.php ./parameth.py -u https://example.com/somepage.php --data &amp;lt;post_data&amp;gt; ./parameth.py -u https://example.com/somepage.php --cookie &amp;lt;cookie&amp;gt;  Tplmap
Server-Side Template Injection and Code Injection Detection and Exploitation Tool.
Usage example: Test if parameter is vulnerable to SSTI: ./tplmap.py -u &#39;http://www.target.com/page?name=John&#39; Launch a pseudo-terminal on the target: ./tplmap.py --os-shell -u &#39;http://www.target.com/page?name=John&#39;  JShell
A nice little tool to quickly get a Javascript shell from XSS. Running shell.py will generate the js payload and setup a listener on port 33 (default).
Usage: python shell.py  OWASP ZAP
Open-source web application security scanner.
Usage: see https://github.com/zaproxy/zaproxy/wiki/Videos  Sublist3r
Fast subdomains enumeration tool for penetration testers.
Example usage: Enumerate subdomains of specific domain: python sublist3r.py -d example.com Show only subdomains which have open ports 80 and 443: python sublist3r.py -d example.com -p 80,443 Show the results in realtime: python sublist3r.py -v -d example.com  WPScan
Black box WordPress vulnerability scanner written for security professionals and blog maintainers to test the security of their sites.
Usage: wpscan [options] Examples: wpscan --url http://example.com --enumerate plugins -o output.txt wpscan --url http://example.com --password-attack=wp-login --usernames=/path/to/usernames.txt --passwords=/path/to/wordlist.txt  Wfuzz
Web application fuzzer.
Example usage: Standard fuzz: wfuzz -w /path/to/wordlist.txt https://example.com/FUZZ Exclude 404 from results: wfuzz -w /path/to/wordlist.txt https://example.com/FUZZ --hc 404 Exclude results having &#39;117 Ch&#39; (chars): wfuzz -w /path/to/wordlist.txt https://example.com/FUZZ --hh 117  XSStrike
XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
Usage: xsstrike.py [-h] [-u TARGET] [--data DATA] [-t THREADS] [--seeds SEEDS] [--json] [--path] [--fuzzer] [--update] [--timeout] [--params] [--crawl] [--blind] [--verbose] [--skip-dom] [--headers] [--proxy] [-d DELAY] [-e ENCODING] Scan a single URL: python xsstrike.py -u &amp;quot;http://example.com/search.php?q=query&amp;quot; Supplying POST data: python xsstrike.py -u &amp;quot;http://example.com/search.php&amp;quot; --data &amp;quot;q=query&amp;quot; Test URL path components: python xsstrike.py -u &amp;quot;http://example.com/search/form/query&amp;quot; --path Bruteforce payloads from a file: python3 xsstrike.py -u &amp;quot;http://example.com/page.php?q=query&amp;quot; -f /path/to/file.txt Blind XSS: python xsstrike.py -u http://example.com/page.php?q=query --crawl --blind More usage commands: https://github.com/s0md3v/XSStrike/wiki/Usage  XXE-FTP
Basic FTP server written in Go to receive payloads from instances of XXE.
Usage: ./xxeftp -p 2121  ]]></content:encoded>
      </item>
    
      <item>
        <title>Wordlist Generators</title>
        <link>https://root4loot.com/pentools/wordlist-generators/</link>
        <dc:creator>root4loot</dc:creator>
        <guid>https://root4loot.com/pentools/wordlist-generators/</guid>
        <description>CeWl
A ruby app which spiders a given URL to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.
Usage: cewl [OPTIONS] ... &amp;lt;url&amp;gt; Example: cewl http://example.com --depth=4 --write=output.txt  Crunch
Wordlist generator based on criteria you specify. The output from crunch can be sent to the screen, file, or to another program.</description>
        <content:encoded><![CDATA[CeWl
A ruby app which spiders a given URL to a specified depth, optionally following external links, and returns a list of words which can then be used for password crackers such as John the Ripper.
Usage: cewl [OPTIONS] ... &amp;lt;url&amp;gt; Example: cewl http://example.com --depth=4 --write=output.txt  Crunch
Wordlist generator based on criteria you specify. The output from crunch can be sent to the screen, file, or to another program.
Example usage: crunch 6 6 -t foo@,% &amp;gt;&amp;gt; wordlist # Generates foo[ALLchars][UPPERCASEletters][0-9]  Wordhound
Wordlist generator that builds a list of password candidates for a specific target website to use with something like Hashcat or Hydra.
Usage: python wordhound.py https://example.com/  ]]></content:encoded>
      </item>
    
  </channel>
</rss>
