• We just launched and are currently in beta. Join us as we build and grow the community.

Hack-Tools – A Extension For Red Team and Web Pentesters

anish58

Code Standardization Advocate
A Rep
0
0
0
Rep
0
A Vouches
0
0
0
Vouches
0
Posts
132
Likes
172
Bits
2 MONTHS
2 2 MONTHS OF SERVICE
LEVEL 1 500 XP
Blue-and-White-Modern-Illustrated-Vaccines-Medical-Presentation.png


Hey Folks, in this tutorial we are going to talk about an interesting tool called “Hack-Tools”. As we know that we search lots of one-liners, encrypter and decrypter during the bug hunting or to playing CTF challenges, hence this tool sepecially made for all these purposes and even it’s not a tool, its basically an extension for Chrome and Firefox browsers.

Lets take a look 🙂 !!

Installation

Installation is going to be very simple because we do not require much effort. When you click here, you will redirect to the extension webpage where you have to click on the add option. That’s it 🙂

1-26.png

Reverse Shell

If I compare in simplicity there is no such tool as it you can see that Just need to give us our own localhost IP address. Just, it will automatically create all the necessary reverse shells that we can use for red teaming, bugs, CTF challenges.

2-27.png


This is not enough, as it creates many reverse shell one-liners that we cannot show you at the same time so you can read by yourself during testing.

3-27.png

PHP Reverse Shell

If the web application is vulnerable to file uploading vulnerability then we can use “pentestmonkey reverse shell” and get interactive reverse shell session on the target machine.

4-26.png

Remote Code Execution

Similarly if we find an RCE vulnerability in a web application then we can use such a payload to take the cmd shell of the target machine.

5-23.png

TTY Spawn Shell

Often we take the shell of the target machine without having TTY, but through the given command we can spawn a tty shell.

6-23.png

LFI

Local File Inclusion is a vulnerability found in a web application. If you are a beginner or do not have much time, it can be helpful for you to find the LFI vulnerability in a web application.

8-17.png

XSS

XSS stands for cross site scripting which is a type of injection vulnerability. Below you can identify that it give us the payload in order to exploit the XSS vulnerability.

9-17.png

SQL Injection

SQL injection comes on the top of all injection vulnerabilities and it seems that it again provides us the payloads with the help of which we can exploit SQL injection vulnerability.

10-16.png

Base64 Encoder and Decoder

Often we use other third party application or website to encode or decode the secret in CTF challenge and even we can do this through this extension.

11-15.png

Hash Generators

We can use this if encoded in a secret hash or if we want to encode our own plain text.

12-15.png

URL Encoder or Decoder

This feature allows us to encode plain text in URL encoding form and decode the URL encoding to plain text.

13-11.png

Template Injections

If you have found a template injection vulnerability then you can take all these payloads to take advantage of this vulnerability.

14-10.png
About the AuthorShubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be Contact on Linkedin.
 

422,212

310,551

310,560

Top