Wednesday, August 22, 2018

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration...

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's a java executable and...
Evilginx

Evilginx – MITM Attack Framework For Phishing Credentials & Session Cookies

Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server,...
Log-killer

Log-killer : Clear All Your Logs In Linux & Windows Servers

Log-killer clear all your logs in linux and windows servers. Just download the tool and run it on the server. If your server OS...
AutoSploit and AutoScanner

AutoNSE – Massive NSE AutoSploit and AutoScanner

Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and adaptable features. It enables...
IDB

IDB – Tool To Simplify Some Common Tasks For iOS Pentesting...

IDB is a tool to simplify some common tasks for iOS pentesting and research. Originally there was a command line version of the tool,...
Apfell

Apfell – A MacOS, Post-Exploit, Red Teaming Framework

Apfell is a macOS, post-exploit, red teaming framework built with python3 and JavaScript. It's designed to provide a collaborative and user friendly interface for...