Tuesday, March 19, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part of the THC-IPv6 tools...
Wifite

Wifite 2.1.0 – Automated Wireless Attack Tool

A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's...
Skiptracer

Skiptracer – OSINT Python Webscaping Framework

Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining results. Skiptracer utilizes some...
Reko

Reko : A General Purpose Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU...
Slither

Slither – Static Analyzer for Solidity

Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details,...