This is a collection of tools which might be useful for you, if you are a pentester or security consultant. All source code published on this website is licensed under the FreeBSD license.
Use the software at YOUR OWN RISK.
It is the user's responsibility to obey all applicable laws. The developer or Encripto AS assume no liability, and are not responsible for any misuse or damage caused by the software.
Do not download or use the software, if you do not agree with such license terms and conditions.
- Maligno v2.2
Maligno is an open source penetration testing tool written in Python that serves Metasploit payloads. It generates shellcode with msfvenom and transmits it over HTTP or HTTPS. The shellcode is encrypted with AES and encoded prior to transmission.
Maligno also comes with a client tool, which supports HTTP, HTTPS and encryption capabilities. The client is able to connect to Maligno in order to download an encrypted Metasploit payload. Once the shellcode is received, the client will decode it, decrypt it and inject it in the target machine.
The client-server communications can be configured in a way that allows you to simulate specific C&C communications or targeted attacks. In other words, the tool can be used as part of adversary replication engagements.
Are you new to Maligno? Check our ongoing Maligno Video Series with examples and tutorials.
Changelog: Get caught mode improvements, new adversary replication profile, bug fixes and minor adjustments.
- Persongen v0.4
Persongen is a tool that generates Norwegian Social Security Numbers (SSNs). It implements Wikipedia's algorithm for calculating SSNs. SSNs are generated based on a given date of birth, gender, and SSN type. As you may guess, Persongen can be useful for testing applications which handle Norwegian SSNs.
Changelog: Output coloring, update detection routine and other minor improvements.
This is a Proof of Concept (PoC) that illustrates a command injection vulnerability affecting Inteno DG301 residential gateways, discovered by Juan J. Güelfo at Encripto AS.
This is a Proof of Concept (PoC) that illustrates two vulnerabilities affecting Netgear ProSafe switches (CVE-2013-4775 & CVE-2013-4776), discovered by Juan J. Güelfo at Encripto AS.