Seccubus – Easy Automated Vulnerability Scanning, Reporting And Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its output, both on the first scan and on repeated scans.On repeated scan delta reporting ensures that findings only need to be judged when they first appear in the scan results or when their output changes.Seccubus 2.x is the only actively developed and maintained branch and all support for Seccubus V1 has officially been dropped.Seccubus V2 works with the following scanners:NessusOpenVASSkipfishMedusa (local and remote)Nikto (local and remote)NMap (local and remote)OWASP-ZAP (local and remote)SSLyzeMedusaQualys SSL labstestssl.sh (local and remote)For more information visit [www.seccubus.com]Default password, changinge it!!!!!After installation the default username and paswword for seccubus is:admin / GiveMeVulns!It is highly recommended you change this after installation./bin/seccubus_passwd -u adminChange logChanges of this branch vs the latest/previous releasex-x-2019 – v2.53 Development releaseThis is work in progressDifferences with 2.52Download Seccubus

Link: http://feedproxy.google.com/~r/PentestTools/~3/V6X3rDBzIjs/seccubus-easy-automated-vulnerability.html

Linux for Pentester: CAT Privilege Escalation

Today we are going to talk about CAT command and learn how helpful the apt command is for Linux penetration testing and how we’ll progress apt to scale the greater privilege shell. Table of Content Introduction to CAT Major Functions of CAT command Sudo rights Lab setups for Privilege Escalation Exploiting Sudo Rights Introduction to… Continue reading →
The post Linux for Pentester: CAT Privilege Escalation appeared first on Hacking Articles.

Link: https://www.hackingarticles.in/linux-for-pentester-cat-privilege-escalation/

Getwin – FUD Win32 Payload Generator And Listener

FUD Win32 payload generator and listenerLegal disclaimer:Usage of GetWin for attacking targets without prior mutual consent is illegal. It’s the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this programFeaturesFUD : Fully UndetectableNo Need configure port forwarding, or install others programs, using only ssh and serveo.net.Usage:git clone https://github.com/thelinuxchoice/getwincd getwinbash getwin.shInstall requirements (mingw-w64):sudo apt-get install mingw-w64Download Getwin

Link: http://feedproxy.google.com/~r/PentestTools/~3/nJnC39lKrHQ/getwin-fud-win32-payload-generator-and.html