Thursday, June 27, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.
OSIF : Open Source Information Facebook

OSIF : Open Source Information Facebook

OSIF is an accurate Facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of...
hydra

Online Password Bruteforce with Hydra-GTK

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like telnet, ssh, http, https,...
XSS-Payload-List

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....
Brutality : A Fuzzer For Any GET Entries

Brutality : A Fuzzer For Any GET Entries

A Brutality is a fuzzer for any GET entries and following are the features ; Multi-threading on demandFuzzing, bruteforcing...
RustBuster : DirBuster for Rust

RustBuster : DirBuster for Rust

RustBuster is a tool to dirbuster for rust and following are the 4 modes(Dir mode, Dns mode, Vhost mode, Fuzz mode) that...
GetWin : FUD Win32 Payload Generator & Listener

GetWin : FUD Win32 Payload Generator & Listener

GetWin is a FUD Win32 payload generator and listener. Following are some of the features of this tool; FUD...