Thursday, June 21, 2018

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
cymothoa

Cymothoa

Maintaining Access to a linux machine using cymothoa - Post Exploitation   Cymothoa is a post-exploitation tool. It can be used to...

Must Need

thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part of the THC-IPv6 tools...
PwnAdventure3

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...

passive_discovery6

Discover IPv6 network range & hosts from an IPv6 enabled network using passive_discovery6. Yet another IPv6 tool from THC Passive_discovery6 passivly sniffs the network and...
wafw00f

wafw00f

Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F. Web Application firewalls are typically firewalls working on the application layer which monitors & modifies...
Python RAT

Stitch A Cross Platform Python Remote Administration Tool

This is a cross-platform python framework that permits you to create custom payloads for Windows, Mac OSX, and UNIX moreover. you're ready to choose...
Concrete5 CMS

Vulnerability Scanner And Information Gatherer For The Concrete5 CMS – C5Scan

Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor. Concrete5 is an open-source content...
wifiphisher

Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access...

Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It...