Isip – Interactive Sip Toolkit For Packet Manipulations, Sniffing, Man In The Middle Attacks, Fuzzing, Simulating Of Dos Attacks

Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.VideoSetupgit clone https://github.com/halitalptekin/isip.gitcd isippip install -r requirements.txtUsagePacket manipulation tools are in packet cmd loop. First start, you are in the main cmd loop.isip:main> packetisip:packet>Create a new sip packet with new command. If you don’t write name, isip create the packet named by message-{id}.isip:packet> newisip:packet> new r1List the all created sip packets with list command.isip:packet> listShow properties of packets with show command. You can type ip, udp or sip with show command.isip:packet> show message-1isip:packet> show message-1 ipisip:packet> show message-1 udpisip:packet> show message-1 sipisip:packet> show message-1 ip srcisip:packet> show message-1 udp sportisip:packet> show message-1 sip uriisip:packet> show message-1 sip headers.toSet the properties of packets with set command. You can type ip, udp or sip and properties label with show command.isip> set message-1 ip src 12.12.12.12isip> set message-1 udp sport 4545isip> set message-1 sip method OPTIONSisip> set message-1 sip headers.from “blabla"Set the random properties of packets with set command. You can use with random-headers-from, random-headers-to, random-headers-call-id, random-headers-max-forwards, random-headers-user-agent, random-headers-contact, random-headers-invite-cseq, random-headers-register-cseq commands.isip:packet> set message-1 ip src random-ipisip:packet> set message-1 udp sport random-portisip:packet> set message-1 sip headers.from random-headers-fromisip:packet> set message-1 sip headers.to random-headers-toisip:packet> set message-1 sip headers.contact random-headers-contactisip:packet> set message-1 sip body random-data 50Send the packet with send command.isip:packet> send message-1 1isip:packet> send message-1 150Parse the text file to packet with parse command.isip:packet> parse test/test1.txt r1Load the packets from pcap file with load command. If you don’t write name, isip create the packet named by message-{id}.isip:packet> load test.pcap r1isip:packet> load test.pcapSave the packets tp pcap file with save command. You can save the packet list just single command.isip:packet> save r1 test.pcapisip:packet> save r2 test.pcap # assume you have r2.0, r2.1, r2.2, r2.3 …Open the wireshark for packets with wireshark command.isip:packet> wireshark r1isip:packet> wireshark r2 # assume you have r2.0, r2.1, r2.2, r2.3 …List the history with hist command.isip:packet> histExecute the shell command with shell or !.isip:packet> shell ls -laisip:packet> ! cat /etc/passwdShow the help page with ? or help command.isip> ?isip> helpisip:packet> ?isip:packet> helpisip:packet> help newisip:packet> help sendisip:packet> help setisip:packet> help showDownload Isip

Link: http://feedproxy.google.com/~r/PentestTools/~3/uy_1PU_v8Z8/isip-interactive-sip-toolkit-for-packet.html

GoldenEye v1.2.0 – Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY!GoldenEye is a HTTP DoS Test Tool.Attack Vector exploited: HTTP Keep Alive + NoCacheUsage USAGE: ./goldeneye.py [OPTIONS] OPTIONS: Flag Description Default -u, –useragents File with user-agents to use (default: randomly generated) -w, –workers Number of concurrent workers (default: 50) -s, –sockets Number of concurrent sockets (default: 30) -m, –method HTTP Method to use ‘get’ or ‘post’ or ‘random’ (default: get) -d, –debug Enable Debug Mode [more verbose output] (default: False) -n, –nosslcheck Do not verify SSL Certificate (default: True) -h, –help Shows this helpUtilitiesutil/getuas.py – Fetchs user-agent lists from http://www.useragentstring.com/pages/useragentstring.php subpages (ex: ./getuas.py http://www.useragentstring.com/pages/Browserlist/) REQUIRES BEAUTIFULSOUP4res/lists/useragents – Text lists (one per line) of User-Agent strings (from http://www.useragentstring.com)Changelog2016-02-06 Added support for not verifying SSL Certificates2014-02-20 Added randomly created user agents (still RFC compliant).2014-02-19 Removed silly referers and user agents. Improved randomness of referers. Added external user-agent list support.2013-03-26 Changed from threading to multiprocessing. Still has some bugs to resolve like I still don’t know how to propperly shutdown the manager.2012-12-09 Initial releaseTo-doChange from getopt to argparseChange from string.format() to printf-likeLEGAL NOTICETHIS SOFTWARE IS PROVIDED FOR EDUCATIONAL USE ONLY! IF YOU ENGAGE IN ANY ILLEGAL ACTIVITY THE AUTHOR DOES NOT TAKE ANY RESPONSIBILITY FOR IT. BY USING THIS SOFTWARE YOU AGREE WITH THESE TERMS.Download GoldenEye

Link: http://feedproxy.google.com/~r/PentestTools/~3/40P1bnGqBqs/goldeneye-v120-layer-7-keepalivenocache.html

LOIC Download – Low Orbit Ion Cannon DDoS Booter

LOIC Download below – Low Orbit Ion Cannon is an Open Source Stress Testing and Denial of Service (DoS or DDoS) attack application written in C#.

What is LOIC Low Orbit Ion Cannon
LOIC was first developed by Praetox Technologies and later released into the public domain, the source code is now freely available and you can download LOIC below as it’s now hosted on several open source platforms.
The Low Orbin Ion Cannon performs a fairly basic TCP, UDP or HTTP DoS attack and when used by multiple individuals as it normally is, a DDoS attack.
Read the rest of LOIC Download – Low Orbit Ion Cannon DDoS Booter now! Only available at Darknet.

Link: https://www.darknet.org.uk/2017/10/loic-download-low-orbit-ion-cannon-ddos-booter/