Tuesday, January 22, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Clrinject

Clrinject – Injects C# EXE or DLL Assembly Into every CLR...

Clrinject injects C# EXE or DLL Assembly into any CLR runtime and AppDomain of another process. The injected assembly can then access static instances...
Evilginx2

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to...
OWTF

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...
SSH Auditor

SSH Auditor – Scan For Weak SSH Passwords On Your Network

SSH Auditor is the best way to scan for weak ssh passwords on your network. SSH Auditor will automatically: Re-check all known hosts as...
KBD-Audio

KBD-Audio : Tools For Capturing & Analysing Keyboard Input Paired With...

KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is called keytap - it...
Hackertarget

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...
HawkEye

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password...