Tuesday, January 22, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

PureBlood

PureBlood – A Penetration Testing Framework created for Hackers / Pentester...

PureBlood is a tool for penetration testing framework created for Hackers / Pentester / Bug Hunter. Thanks to Cr4sHCoD3 for developing the tool. Also Read Dejavu...
Vproxy

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Firework

Firework – Tool To Interact With Microsoft Workplaces Creating Valid...

Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process. The tool also wraps...
MalwareCMDMonitor

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On...

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In a nutshell, it downloads...
BabySploit

BabySploit – Beginner Pentesting Toolkit/Framework Written in Python

BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a...
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...