Monday, August 20, 2018

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
Armory

Armory – Tool To Take Lot Of External & Discovery Data

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a...
Remote-Desktop-Caching

Remote-Desktop-Caching : Recover Old RDP (MSTSC) Session Information In The Form...

Remote-Desktop-Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team...
Shodanwave

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part of the THC-IPv6 tools...

passive_discovery6

Discover IPv6 network range & hosts from an IPv6 enabled network using passive_discovery6. Yet another IPv6 tool from THC Passive_discovery6 passivly sniffs the network and...
wpcrack

WpCrack – Simple Tool For Brute Force WordPress

Wpcrack is simple tool for brute force Wordpress. It was made by ZoneSec team, using python language. Installation WpCrack git clone https://github.com/MrSqar-Ye/wpCrack.git Also Read CSS Keylogger – Chrome...