Monday, January 27, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

EvilClippy

EvilClippy : For Creating Malicious MS Office Documents

EvilClippy is a cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse...
CyberRange : The Open-Source AWS Cyber Range

CyberRange : The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete...
PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email,...
PAnalizer

PAnalizer : Forensic Tool Search Images In A Specific Directory

PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection.
Rebel Framework : Penetration Testing Framework

Rebel Framework : Penetration Testing Framework

Rebel framework is an advanced and easy to use penetration testing framework. Start git...
Termshark : A Terminal UI For Tshark

Termshark : A Terminal UI For Tshark

Termshark is a terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a...
Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer : Convolutional Neural Network For Analyzing Pentest

Eyeballer is meant for large-scope network penetration tests where you need to find "interesting" targets from a huge set of web-based hosts....