Dsniff download is a collection of tools for network auditing & penetration testing. Dsniff, filesnarf, mailsnarf, msgsnarf, URLsnarf, and WebSpy passively monitor a network for interesting data (passwords, e-mail, files, etc.).
ARPspoof, DNSspoof, and macof facilitate the interception of network traffic normally unavailable to an attacker (e.g, due to layer-2 switching). sshmitm and webmitm implement active monkey-in-the-middle attacks against redirected SSH and HTTPS sessions by exploiting weak bindings in ad-hoc PKI.
Read the rest of dsniff Download – Tools for Network Auditing & Password Sniffing now! Only available at Darknet.
RandIP is a nim-based network mapper application that generates random IP addresses and uses sockets to test whether the connection is valid or not with additional tests for Telnet and SSH.
RandIP – Network Mapper Features
- HTTP and HTTPS enumeration
- Python enumeration exploits
- SSH enumeration exploits
- Logger and error-code handler
- SSH and Telnet Timeouts to prevent blocking
- SSH Enumerations work in tandem
You can download RandIP here:
Or read more here.
Read the rest of RandIP – Network Mapper To Find Servers now! Only available at Darknet.
Enumall is a Python-based tool that helps you do subdomain discovery using only one command by combining the abilities of Recon-ng and AltDNS.
This gives you the ability to run multiple domains within the same session. The tool only has one module that needs an API key (/api/google_site) find instructions for that on the recon-ng wiki.
Setting up Enumall for Subdomain Discovery
Install recon-ng from Source, clone the Recon-ng repository:
git clone https://[email protected]/LaNMaSteR53/recon-ng.git
Change into the Recon-ng directory:
pip install -r REQUIREMENTS
Link the installation directory to /usr/share/recon-ng
ln -s /$recon-ng_path /usr/share/recon-ng
Optionally (highly recommended) download:
– A good subdomain bruteforce list (example here)
Create the config.py file and specify the path to Recon-ng and AltDNS as it showed in config_sample.py.
Read the rest of Enumall – Subdomain Discovery Using Recon-ng & AltDNS now! Only available at Darknet.
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
It also integrates with subbrute for subdomain brute-forcing with word lists.
Features of Sublist3r Subdomain Enumeration Tool
It enumerates subdomains using many search engines such as:
The tool also enumerates subdomains using:
Requirements of Sublist3r Subdomain Search
It currently supports Python 2 and Python 3.
Read the rest of Sublist3r – Fast Python Subdomain Enumeration Tool now! Only available at Darknet.