Looking for the latest version? Download opensource.tar.gz (26.9 MB) Warning! Malware detected. Download at your own risk.
Name Modified Size Downloads / Week Status
opensource[kali].tar.gz 2015-11-30 26.9 MB 5858 weekly downloads
opensource.tar.gz 2015-11-30 26.9 MB 7979 weekly downloads
README.txt 2015-11-29 4.8 kB 33 weekly downloads
opensource[backtrack].tar.gz 2013-11-24 1.8 MB 44 weekly downloads
Totals: 4 Items   55.6 MB 144
+--------------------------------------------------------------------+ | netool.sh V4.6 (Stable repository) | | develop by pedr0 Ubuntu [r00t-3xp10it] | | Suspicious Shell Activity Labs@2013 | +--------------------------------------------------------------------+ This is the oficial repository (Stable) of netool.sh, were we can download the bug-free tested versions of the tool (oficial release). +--------------------------------------------------------------------+ | Downloads available are | +--------------------------------------------------------------------+ netool.sh V4.6 [linux-ubuntu] -> opensource.tar.gz netool.sh V4.6 [linux-kali] -> opensource[kali].tar.gz netool.sh V3.0 [linux-backtrack] -> opensource[backtrack].tar.gz +--------------------------------------------------------------------+ | The reazon why i did the tool | +--------------------------------------------------------------------+ Iam a white hat, developer, pentester, blogger, so i dont like to harm people , if you take a closer look to my 'netool.sh' you will notest that allmost all attacks are performed inside Local Lan using (MITM). "a whitehat as the rigth to do what it feel like inside is own local network to an intruder... offcourse people can use this tool to harm others on local lan (neighbor WIFI), or using it in a Fake-Ap (honeypot) but in the begining I did not have develop the tool for that" netool.sh [white hat] usage: local lan, pentesting lab netool.sh [black hat] usage: honeypot, cybercaffe, neighbor WIFI "netool.sh as original develop to show the power of ettercap framework and everything related to MITM attacks, also to show how scripting can automate things up", netool.sh tool provides a fast and easy way for new arrivals to security pentesting as also to experience users to use allmost all features that the Man-In-The-Middle can provide... +--------------------------------------------------------------------+ | Description of the tool | +--------------------------------------------------------------------+ netool.sh is a script in bash to automate frameworks like metasploit, Nmap, Driftnet, SSLstrip, and Ettercap MITM attacks, Retrieves metadata, geo-location of target, as the hability to capture SSL passwords under MITM, sniff URL accessed by target machine, changes hostname, change IP and Mac-Address to decoy scans, capture pictures of web-browser surfing (diftnet), perform TCP/UDP packets manipulation using etter.filters, DoS attacks on local/external network, webcrawler.py [scan websites], admin page finder, uses the external script (cupp.py) to build a dicionary (common password profiler),also a collection of post exploitation modules (meterpreter auxiliary) develop by me, a collection of automated exploits [r00tsect0r automated exploits] module to have full control of target system, at last a module to perform (DNS-Spoof) using Ettercap... +--------------------------------------------------------------------+ | Disclamer | +--------------------------------------------------------------------+ The author is not held responsible for damages caused to third parties PC's or errors caused by the bad use of this script, This script was developed thinking in the OpenSource spirit, in which sharing c0d is not a crime! please respect the privacie of other people and use this tool the ethical way (on a pentesting lab or inside your local lan). If you have any suggestions, comments, bugs to report, questions or concerns about this script feel free to get in touch with me at: https://sourceforge.net/p/netoolsh/discussion/general/thread/928a3086/?limit=25#0214/cc81 +--------------------------------------------------------------------+ | Special Thanks to | +--------------------------------------------------------------------+ h4x0r :Apofis Kaizer [Debug on Mac OSx Systems] friend :x0ra-machine [for is Pentesting Lab] Developer :Fyodor [Nmap] Developer :ALoR & NaGa [Ettercap] Developer :HD moore [Metasploit] Developer :Moxie M [Sslstrip] Developer :Chris L [Driftnet] Developer :j0rgan [Cupp.py] Developer :cleiton p [inurlbr.php] Developer :ReL1K [unicorn.py] Developer :KyRECON [shellter] Enjoy and save Hacking ... Develop by pedr0 Ubuntu [r00t-3xp10it] Suspicious Shell Activity Labs@2013 | r00tsect0r redteam
Source: README.txt, updated 2015-11-29

Thanks for helping keep SourceForge clean.

Screenshot instructions:
Red Hat Linux   Ubuntu

Click URL instructions:
Right-click on ad, choose "Copy Link", then paste here →
(This may not be possible with some types of ads)

More information about our ad policies

Briefly describe the problem (required):

Upload screenshot of ad (required):
Select a file, or drag & drop file here.

Please provide the ad click URL, if possible:

Get latest updates about Open Source Projects, Conferences and News.

Sign up for the SourceForge newsletter:

No, thanks