Tuesday, August 3, 2021

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Qvm-Create-Windows-Qube : Spin Up New Windows Qubes Quickly, Effortlessly And Securely

Qvm-Create-Windows-Qube : Spin Up New Windows Qubes Quickly, Effortlessly And Securely

Qvm-Create-Windows-Qube is a tool for quickly and conveniently installing fresh new Windows qubes with Qubes Windows Tools (QWT) drivers automatically. It officially supports Windows 7, 8.1...
EvilClippy

EvilClippy : For Creating Malicious MS Office Documents

EvilClippy is a cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse...
Aron

Aron – A GO Script For Finding Hidden GET & POST...

Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go...
Linux

Top Best Useful Commands for Kali Linux?

Linux administrators can't live by the graphical UI alone. That is the reason we've ordered helpful Linux commands into this advantageous guide. Kali Linux...
BlackDir Framework : Web Application Vulnerability Scanner

BlackDir Framework : Web Application Vulnerability Scanner

BlackDir Framework is a Web Application Vulnerability Scanner with the following features; Spider DirectoriesFind Sub DomainAdvanced Dorks SearchScan list...
Badlnk : Reverse Shell In Shortcut File (.lnk)

Badlnk : Reverse Shell In Shortcut File (.lnk)

Badlnk is a reverse shell in shortcut file (.lnk). How it works? Shortcut file...
Terrier : A Image & Container Analysis Tool

Terrier : A Image & Container Analysis Tool

Terrier is a Image and Container analysis tool that can be used to scan Images and Containers to identify and verify the...