Tuesday, March 19, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Hacking With BeEF- Fake Flash Update, Add-ons Installation, Stealing Facebook &...

Hacking With BeEf, The Browser Exploitation Framework is a penetration testing tool which focuses strongly on web browsers. Unlike other security frameworks,...
sawef

SAWEF – Send Attack Web Forms

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with HTTP, so far it,...
Telebix

Telebix – Telebix is an application that communicates with a Bot...

Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure monitored by Zabbix,...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
Curate

Curate – A tool for fetching archived URLs

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will clone this repository and then move...
HeapHopper

HeapHopper – A Bounded Model Checking Framework For Heap-Implementations

HeapHopper is a bounded model checking framework for Heap-implementation.  HeapHopper Setup sudo apt update && sudo apt install build-essential python-dev virtualenvwrapper git clone https://github.com/angr/heaphopper.git && cd ./heaphopper mkvirtualenv...