Tuesday, March 19, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Tcpreplay

Tcpreplay – Pcap Editing & Replay Tools For UNIX & Windows

Tcpreplay is a suite of GPLv3 licensed utilities for UNIX operating systems for editing and replaying network traffic which was previously captured...
Goca

Goca : Scanner Used To Find Metadata & Hidden Information

Goca is a FOCA fork written in Go, which is a tool used mainly to find metadata and hidden information...
IDB

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting...

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line version of the tool,...
Ridrelay

RidRelay – Easy Way To Get Domain Usernames While On An...

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and...
Munin

Munin – Online Hash Checker For Virustotal & Other Services

Munin is a online hash checker utility that retrieves valuable information from various online sources The current version of Munin queries the following services: Virustotal ...
Phantom-Evasion

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most ...
Armory

Armory – Tool To Take Lot Of External & Discovery Data

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a...