Packages that are used for tool or work ow automation.


Tool count: 70

BlackArch automation
Name Version Description Homepage
apt2 175.6732505 Automated penetration toolkit.
automato 26.0aa769d Should help with automating some of the user-focused enumeration tasks during an internal penetration test.
autonessus 24.7933022 This script communicates with the Nessus API in an attempt to help with automating scans.
autonse 21.73a6021 Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner.
autopwn 177.2f3f605 Specify targets and run sets of tools against them.
autovpn 17.4e19a80 Easily connect to a VPN in a country of your choice.
awsbucketdump 75.552e7f1 A tool to quickly enumerate AWS S3 buckets to look for loot.
blueranger 1.0 A simple Bash script which uses Link Quality to locate Bluetooth device radios.
brutespray 128.56e0b07 Brute-Forcing from Nmap output - Automatically attempts default creds on found services.
brutex 43.6c199b1 Automatically brute force all services running on a target.
cewl 5.3 A custom word list generator
checksec 1.9.0 Tool designed to test which standard Linux OS and PaX security features are being used
cisco-snmp-enumeration 10.ad06f57 Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking.
clusterd 143.d190b2c Automates the fingerprinting, reconnaissance, and exploitation phases of an application server attack.
crunch 3.6 A wordlist generator for all combinations/permutations of a given character set.
dracnmap 69.09d3945 Tool to exploit the network and gathering information with nmap help.
dumb0 19.1493e74 A simple tool to dump users in popular forums and CMS.
easy-creds 3.9 A bash script that leverages ettercap and other tools to obtain credentials.
easyda 7.0867f9b Easy Windows Domain Access Script.
empire 1505.92fcf43 A PowerShell and Python post-exploitation agent.
findsploit 69.1d700e7 Find exploits in local and online databases instantly.
fstealer 0.1 Automates file system mirroring through remote file disclosur vulnerabilities on Linux machines.
glue 370.0422e5c A framework for running a series of tools.
google-explorer 129.a923d02 Google mass exploit robot - Make a google search, and parse the results for a especific exploit you define.
gooscan 1.0.9 A tool that automates queries against Google search appliances, but with a twist.
hackersh 0.2.0 A shell for with Pythonect-like syntax, including wrappers for commonly used security tools.
hate-crack 51.47ba42c A tool for automating cracking methodologies through Hashcat.
intersect 2.5 Post-exploitation framework
ldapscripts 2.0.8 Simple shell scripts to handle POSIX entries in an LDAP directory.
linset 9.8746b1f Evil Twin Attack Bash script - An automated WPA/WPA2 hacker.
maskprocessor 0.73 A High-Performance word generator with a per-position configurable charset.
masscan-automation 24.2df3467 Masscan integrated with Shodan API.
massexpconsole 191.f7cf942 A collection of tools and exploits with a cli ui for mass exploitation.
merlin-server 0.6.0 Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.
metasploit-autopwn 11.5598fe1 db_autopwn plugin of metasploit.
mitmap-old 0.1 Shell Script for launching a Fake AP with karma functionality and launches ettercap for packet capture and traffic manipulation.
morpheus 45.24ad5a5 Automated Ettercap TCP/IP Hijacking Tool.
msf-mpc 23.eb2279a Msfvenom payload creator.
msfenum 33.17bd3ee A Metasploit auto auxiliary script.
mutator 51.164132d This project aims to be a wordlist mutator with hormones, which means that some mutations will be applied to the result of the ones that have been already done, resulting in something like: corporation -> C0rp0r4t10n_2012
nfspy 1.0 A Python library for automating the falsification of NFS credentials when mounting an NFS share.
nfsshell 19980519 Userland NFS command tool.
nosqlattack 94.93c9bde Python tool to automate exploit MongoDB server IP on Internet anddisclose the database data by MongoDB default configuration weaknesses and injection attacks.
panoptic 185.df35a6c A tool that automates the process of search and retrieval of content for common log and config files through LFI vulnerability.
pasv-agrsv 57.6bb54f7 Passive recon / OSINT automation script.
penbox 81.3b77c69 A Penetration Testing Framework - The Tool With All The Tools.
pentmenu 192.abb78c5 A bash script for recon and DOS attacks.
portia 38.36b974a Automate a number of techniques commonly performed on internal network penetration tests after a low privileged account has been compromised.
python-shodan 1.10.4 Python library for Shodan (https://developer.shodan.io).
regeorg 30.1ca54c2 The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.
rsmangler 1.4 rsmangler takes a wordlist and mangle it
sakis3g 0.2.0e An all-in-one script for connecting with 3G.
search1337 13.c69937e 1337Day Online Exploit Scanner.
shodan 1.10.4 Python library for Shodan (https://developer.shodan.io).
simple-ducky 1.1.1 A payload generator.
sipvicious 0.2.8 Tools for auditing SIP devices
sn00p 0.8 A modular tool written in bourne shell and designed to chain and automate security tools and tests.
sploitctl 2.0.1 Fetch, install and search exploit archives from exploit sites like exploit-db and packetstorm.
spookflare 19.a16004e Loader, dropper generator with multiple features for bypassing client-side and network-side countermeasures.
statsprocessor 0.11 A high-performance word-generator based on per-position Markov-attack.
thefatrat v1.9.3.r200.gaf28832 TheFatRat a massive exploiting tool: easy tool to generate backdoor and easy tool to post exploitation attack.
tiger 3.2.3 A security scanner, that checks computer for known problems. Can also use tripwire, aide and chkrootkit.
tlssled 1.3 A Linux shell script whose purpose is to evaluate the security of a target SSL/TLS (HTTPS) web server implementation.
unix-privesc-check 1.4 Tries to find misconfigurations that could allow local unprivilged users to escalate privileges to other users or to access local apps (e.g. databases).
username-anarchy 54.d5e653f Tools for generating usernames when penetration testing.
veil 3.1.11 A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
vlan-hopping 21.a37ba4e Easy 802.1Q VLAN Hopping
voiphopper 2.04 A security validation tool that tests to see if a PC can mimic the behavior of an IP Phone. It rapidly automates a VLAN Hop into the Voice VLAN.
wikigen 8.348aa99 A script to generate wordlists out of wikipedia pages.
wnmap 0.1 A shell script written with the purpose to automate and chain scans via nmap. You can run nmap with a custom mode written by user and create directories for every mode with the xml/nmap files inside.