Friday, April 3, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Leaked

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...
Sherlock : Find Usernames Across Social Networks

Sherlock : Find Usernames Across Social Networks

Sherlock Project provides a very powerfull command line tool called Sherlock to find usernames across many social networks. It requires Python 3.6 or...

Reverse Phone Lookup and 3 more Methods to Help You Find...

A secure web hosting is an essential cog in the wheel for any online business. It does not matter whether you're just creating a...
XSS-Freak : XSS Scanner Fully Written In Python3 From Scratch

XSS-Freak : XSS Scanner Fully Written In Python3 From Scratch

XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls...
HeapInspect : Inspect Heap In Python

HeapInspect : Inspect Heap In Python

HeapInspect is designed to make heap much more prettier. So let us have some of the feature of this tool which will...
VTHunting : A Tiny Script Used to Generate Report About Virus Total Hunting

VTHunting : A Tiny Script Used to Generate Report About Virus...

VTHunting is a tiny tool based on the VT api version 3 to run daily, weekly or monthly report about malware hunting....
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...