Wednesday, April 1, 2020

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
MacSubstrate

MacSubstrate – Tool For Interprocess Code Injection On macOS

MacSubstrate is a platform tool for interprocess code injection on macOS, with the similar function to Cydia Substrate on iOS. Using macSubstrate, you can...
Win-PortFwd

Win-PortFwd : Powershell Script To Setup Windows Port Forwarding Using Native...

Win-PortFwd is a powershell script to setup windows port forwarding using native netsh client. Installation git clone https://github.com/deepzec/Win-PortFwd.git Win-PortFwd Usage .win-portfwd.ps1 or powershell.exe -noprofile -executionpolicy bypass -file .win-portfwd.ps1 Also Read MacSubstrate –...
Android Application

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change...
TakeOver : Sub-Domain TakeOver Vulnerability Scanner

TakeOver : Sub-Domain TakeOver Vulnerability Scanner

Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed...
libsodium

Libsodium – Easy To Use Software Library

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It...
MASC : A Web Malware Scanner

MASC : A Web Malware Scanner

MASC is a malware (web) scanner developed during CyperCamp Hackathon 2017. At the moment, there are some features available for any type...