Wednesday, October 16, 2019

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material...
Vba2Graph

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph, with potential malicious keywords...
Camelishing

Camelishing – Social Engineering Tool

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or...
Termshark : A Terminal UI For Tshark

Termshark : A Terminal UI For Tshark

Termshark is a terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a...
QRLJacking

QRLJacking : A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that...
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...

KDE Applications 19.04 Release

Recently, a new version of KDE Applications was released. It includes 150+ fixes, numerous new updates and fresh options, and several dozens...