• Warning! Malware detected. Download at your own risk.
Download Latest Version opensource.tar.gz (26.9 MB)
Email in envelope

Get an email when there's a new version of netool toolkit 4.6

Home
Name Modified Size InfoDownloads / Week
opensource[kali].tar.gz 2015-11-30 26.9 MB
opensource.tar.gz 2015-11-30 26.9 MB
README.txt 2015-11-29 4.8 kB
opensource[backtrack].tar.gz 2013-11-24 1.8 MB
Totals: 4 Items   55.6 MB 4
+--------------------------------------------------------------------+
|                 netool.sh V4.6 (Stable repository)                 |
|               develop by pedr0 Ubuntu [r00t-3xp10it]               |
|                Suspicious Shell Activity Labs@2013                 |
+--------------------------------------------------------------------+
  This is the oficial repository (Stable) of netool.sh, were we can
 download the bug-free tested versions of the tool (oficial release). 


+--------------------------------------------------------------------+
|                    Downloads available are                         |
+--------------------------------------------------------------------+
  netool.sh V4.6   [linux-ubuntu]    -> opensource.tar.gz
  netool.sh V4.6   [linux-kali]      -> opensource[kali].tar.gz
  netool.sh V3.0   [linux-backtrack] -> opensource[backtrack].tar.gz








+--------------------------------------------------------------------+
|                  The reazon why i did the tool                     |
+--------------------------------------------------------------------+
 Iam a white hat, developer, pentester, blogger, so i dont like to harm
 people , if you take a closer look to my 'netool.sh' you will notest
 that allmost all attacks are performed inside Local Lan using (MITM). 


 "a whitehat as the rigth to do what it feel like inside is own
 local network to an intruder... offcourse people can use this tool
 to harm others on local lan (neighbor WIFI), or using it in a Fake-Ap
 (honeypot) but in the begining I did not have develop the tool for that"

 netool.sh [white hat] usage: local lan, pentesting lab
 netool.sh [black hat] usage: honeypot, cybercaffe, neighbor WIFI


 "netool.sh as original develop to show the power of ettercap framework
 and everything related to MITM attacks, also to show how scripting can
 automate things up", netool.sh tool provides a fast and easy way for
 new arrivals to security pentesting as also to experience users to use
 allmost all features that the Man-In-The-Middle can provide... 



+--------------------------------------------------------------------+
|                     Description of the tool                        |
+--------------------------------------------------------------------+
 netool.sh is a script in bash to automate frameworks like metasploit,
 Nmap, Driftnet, SSLstrip, and Ettercap MITM attacks, Retrieves metadata,
 geo-location of target, as the hability to capture SSL passwords under
 MITM, sniff URL accessed by target machine, changes hostname, change IP
 and Mac-Address to decoy scans, capture pictures of web-browser surfing
 (diftnet), perform TCP/UDP packets manipulation using etter.filters,
 DoS attacks on local/external network, webcrawler.py [scan websites],
 admin page finder, uses the external script (cupp.py) to build a dicionary
 (common password profiler),also a collection of post exploitation modules
 (meterpreter auxiliary) develop by me, a collection of automated exploits
 [r00tsect0r automated exploits] module to have full control of target
 system, at last a module to perform (DNS-Spoof) using Ettercap...



+--------------------------------------------------------------------+
|                           Disclamer                                |
+--------------------------------------------------------------------+ 
 The author is not held responsible for damages caused to third parties
 PC's or errors caused by the bad use of this script, This script was
 developed thinking in the OpenSource spirit, in which sharing c0d is
 not a crime! please respect the privacie of other people and use this
 tool the ethical way (on a pentesting lab or inside your local lan).

 If you have any suggestions, comments, bugs to report, questions
 or concerns about this script feel free to get in touch with me at:
 https://sourceforge.net/p/netoolsh/discussion/general/thread/928a3086/?limit=25#0214/cc81



+--------------------------------------------------------------------+
|                        Special Thanks to                           |
+--------------------------------------------------------------------+
 h4x0r       :Apofis Kaizer [Debug on Mac OSx Systems]
 friend      :x0ra-machine  [for is Pentesting Lab]
 Developer   :Fyodor        [Nmap]
 Developer   :ALoR & NaGa   [Ettercap]
 Developer   :HD moore      [Metasploit]
 Developer   :Moxie M       [Sslstrip]
 Developer   :Chris L       [Driftnet]
 Developer   :j0rgan        [Cupp.py]
 Developer   :cleiton p     [inurlbr.php]
 Developer   :ReL1K         [unicorn.py]
 Developer   :KyRECON       [shellter]





Enjoy and save Hacking ...
Develop by pedr0 Ubuntu [r00t-3xp10it]
Suspicious Shell Activity Labs@2013 | r00tsect0r redteam
Source: README.txt, updated 2015-11-29