Thursday, September 24, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Driver Development

Driver Development Services And Are They Worth It?

Is it worth your money to spend on device driver development service? Or is it better to allocate that money elsewhere? The...
Nuages : A Modular C2 Framework 2019

Nuages : A Modular C2 Framework 2019

Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must be developed...
XSStrike

XSStrike : Most Advanced XSS Scanner

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine...
Linux

Top Best Useful Commands for Kali Linux?

Linux administrators can't live by the graphical UI alone. That is the reason we've ordered helpful Linux commands into this advantageous guide. Kali Linux...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.

Cangibrina – A Fast & Powerfull Dashboard (admin) Finder

Cangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txt Requirements: Python 2.7 ...
SShuttle: Where Transparent Proxy Meets VPN Meets SSH

SShuttle: Where Transparent Proxy Meets VPN Meets SSH

SShuttle is a transparent proxy server that works as a poor man's VPN. Forwards over ssh. Doesn't require admin....