Friday, December 6, 2019
Home Authors Posts by Ravi Sankar

Ravi Sankar

Must Need

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To...

SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it...
Kage

Kage – Graphical User Interface for Metasploit Meterpreter & Session Handler

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For now it...
Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics &...

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing EDR...
Volatility Framework

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized...
Evilginx2

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to...
Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...