netool.sh toolkit provides a fast and easy way For new arrivals to IT security
pentesting and also to experience users to use allmost all features that the
Man-In-The-Middle can provide under local lan, since scanning, sniffing and
social engeneering attacks "[phishing attacks over mitm]"...
"Scanning - Sniffing - Social Engeneering"
Netool: its a toolkit written using 'bash, python, ruby' that allows you to
automate frameworks like Nmap, Driftnet, Sslstrip, Metasploit and Ettercap
MitM attacks. this toolkit makes it easy tasks such as SNIFFING tcp/udp traffic,
Man-In-The-Middle attacks, SSL-sniff, DNS-spoofing, D0S attacks in wan/lan
networks, TCP/UDP packet manipulation using etter-filters, and gives you
the ability to capture pictures of target webbrowser surfing (driftnet)
also uses macchanger to decoy scans changing the mac address.
Rootsector: module allows you to automate some attacks over DNS_SPOOF + MitM
(phishing - social engineering) using metasploit, apache2 and ettercap frameworks.
like the generation of payloads,shellcode,backdoors delivered using dns_spoof
and MitM method to redirect a target to your phishing webpage.
Recently was introduced "inurlbr" webscanner (by cleiton) that allow us to search
SQL related bugs, using severeal search engines, also this framework can be
used in conjunction with other frameworks like nmap, (using the flag --comand-vul)
Example: inurlbr.php -q 1,2,10 --dork 'inurl:index.php?id=' --exploit-get ?´0x27
-s report.log --comand-vul 'nmap -Pn -p 1-8080 --script http-enum --open _TARGET_'
Linux-Ubuntu | Linux-kali | Parrot security OS | backbox OS
Linux-backtrack (un-continued) | Mac osx (un-continued).
Additionally was build one 'UNIVERSAL INSTALLER' to help us download/install
the toolkit for: Kali, Ubuntu, Backbox, Parrot, Debian, Lubuntu, Xubuntu, etc.
it will download the correct toolkit for your OS to is default install PATH,
and triggers the 'INSTALL.sh', with little interaction needed from user.
"downloader.sh" gives you the choise to download the
STABLE (bug-free) or the GIT (under-develop) version of my toolkit...
In this 'wall of fame' we have all developers that have contributed in any way to this project,
reporting bugs, debbuging the tool or even sourcecode Contributions. "my warm thanks to
all opensource hax0rs out there that have help me"... wall of fame