Wednesday, October 16, 2019

Forensics

Forensics Main Menu

Forensics

Home Forensics
Forensics Main Menu

No posts to display

Must Need

TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

TOR Router : A Tool That Allow You To Make TOR...

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only...
ARDT

ARDT : Akamai Reflective DDoS Tool

Attack the origin host behind the Akamai Edge hosts and bypass the DDoS protection offered by Akamai services.
BabySploit

BabySploit – Beginner Pentesting Toolkit/Framework Written in Python

BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a...
iCULeak : Tool To Find & Extract Credentials From Phone Configuration Files Hosted On CUCM

iCULeak : Tool To Find & Extract Credentials From Phone Configuration...

iCULeak (iCULeak.py) is a tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call...
BlackArch Linux – Penetration Testing Distribution

BlackArch Linux – Penetration Testing Distribution

BlackArch Linux is an Arch Linux-based distribution for penetration testers and security researchers. The repository contains 2336 tools. You can install tools individually or...
AutoRDPwn : The Shadow Attack Framework

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature...
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...