Monday, January 27, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety...

Must Need

Aura Botnet : A Super Portable Botnet Framework With A Django-Based C2 Server

Aura Botnet : A Super Portable Botnet Framework With A Django-Based...

Aura Botnet is a super portable botnet framework with a Django-based C2 server. The client is written in C++, with alternate clients...
DNSPY

DNSpy – .NET Debugger And Assembly Editor

DNSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't...
DDoS

Top 5 DDoS Attacking Tools For Linux,Windows & Android

DDOS or Distributed Denial of Service Attack is the most strong version of  DOS attack. In this, many computers are used to...
LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN or Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error. ...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )
Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien : Tool To Launch Attack On k8s Cluster

Kube-Alien tool launches attack on k8s cluster from within. That means you already need to have an access with permission to deploy...
Gosec : Golang Security Checker To Inspects Source Code

Gosec : Golang Security Checker To Inspects Source Code

Gosec is a inspects source code for security problems by scanning the Go AST. Licensed under the Apache License, Version 2.0...