Wednesday, May 12, 2021

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

XXRF Shots

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class where attacker sends crafted...
CloudBunny

CloudBunny – CloudBunny Is A Tool To Capture The Real IP...

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool...
DeathRansom : A Ransomware To Bypass Technics For Educational Purposes

DeathRansom : A Ransomware To Bypass Technics For Educational Purposes

DeathRansom is a ransomware developed in python, with bypass technics, for educational purposes. What is a ransomware?
Kage

Kage – Graphical User Interface for Metasploit Meterpreter & Session Handler

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For now it...
Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial & Customized Assessment

Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial...

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no...
Clrinject

Clrinject – Injects C# EXE or DLL Assembly Into every CLR...

Clrinject injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can then access static instances...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...