Wednesday, May 22, 2019

Post Exploitation

Maintaining Access Main menu

Post Exploitation

Home Post Exploitation
Maintaining Access Main menu

No posts to display

Must Need

Subscraper

Subscraper – Tool That Performs Subdomain Enumeration Through Various Techniques

SubScraper uses DNS brute force, Google & Bing scraping, and Virus Total to enumerate subdomains without an API. Written in Python3, SubScraper performs HTTP(S)...
CommandoVM

CommandoVM : Windows-Based Security Distribution for Penetration Testing

Welcome to CommandoVM a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script)
Introspy-iOS

Introspy-iOS : Security Tool For Profiling iOS Application at Runtime

Introspy-iOS is a blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
hideNsneak

hideNsneak – A CLI For Ephemeral Penetration Testing

hideNsneak application assists in managing attack infrastructure for penetration testers by providing an interface to rapidly deploy, manage, and take down various cloud services....
Arjun

Arjun : HTTP Parameter Discovery Suite

Also Read - PFQ : Functional Network Framework for Multi-Core Architectures Usage
Sh00t

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy,...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used to monitor thousands of...