Wednesday, July 8, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Ngrev : Tool For Reverse Engineering of Angular Applications

Ngrev : Tool For Reverse Engineering of Angular Applications

Graphical tool for reverse engineering of Angular projects. Ngrev allows you to navigate in the structure of your application and observe...
WTF

WTF – A Personal Information Dashboard For Your Terminal

WTF is a personal terminal-based dashboard utility, designed for displaying infrequently-needed, but very important, daily data. WTF is only compatible with Go versions 1.9.2...
Caldera : An Automated Adversary Emulation System

Caldera : An Automated Adversary Emulation System

CALDERA is an automated adversary emulation system, built on the MITRE ATT&CK™ framework. It works by attaching abilities to an adversary and running...
Xori

Xori : An Automation-Ready Disassembly & Static Analysis Library

Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and provides triage analysis data.
XSStrike

XSStrike : Most Advanced XSS Scanner

XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine...
Zeek : A Powerful Network Analysis Framework

Zeek : A Powerful Network Analysis Framework

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Kippo – SSH Honeypot

Kippo – SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...