Wednesday, August 22, 2018

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Delta

Delta – SDN Security Evaluation & Penetration Testing Framework

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown...
BootStomp

BootStomp – A Bootloader Vulnerability Bug Finder

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage...

Idisagree – Control Remote Computers Using Discord Bot & Python 3

Idisagree is a tool to Control remote computers using discord bot and python 3. If your target is a windows system, you may want...
Camelishing

Camelishing – Social Engineering Tool

Camelishing is a Social Engineering tool with the features like Bulk email sending, Basic Python Agent Creator, Office Excel Macro Creator, DDE Excel Creator(or...
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
EasySSH

Easyssh – The SSH Connection Manager To Make Your Life Easier

Easyssh is a complete, efficient and easy-to-use manager. Create and edit connections, groups, customize the terminal, with multiple instances of the same connection. Easyssh Features ...