Monday, January 27, 2020

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python...

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an...
Sh00t

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy,...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Hacktronian : All in One Hacking Tool for Linux & Android

Hacktronian : All in One Hacking Tool for Linux & Android

Hacktronian is an all in one Hacking tool for Linux & Android and pentesing tools that all Hacker needs.
Auto_Re : IDA PRO Auto-Renaming Plugin With Tagging Support

Auto_Re : IDA PRO Auto-Renaming Plugin With Tagging Support

Auto_re dummy-named functions, which have one API call or jump to the imported API. Before
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
MongoBuster

MongoBuster : Hunt Open MongoDB Instances

MongoBuster is a hunt open mongoDB instances. Following are the features that are associated with this. Worlds fastest and...