Wednesday, August 22, 2018

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

SPF – SpeedPhish Framework For Phishing Exercises

SPF is nothing but a SpeedPhish Framework tool designed using a python to allow for quick recon and deployment of simple social engineering phishing...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...
WTF

WTF – A Personal Information Dashboard For Your Terminal

WTF is a personal terminal-based dashboard utility, designed for displaying infrequently-needed, but very important, daily data. WTF is only compatible with Go versions 1.9.2...
CertCrunchy

CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates...

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
Vproxy

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...