Sunday, January 24, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation Cymothoa Flow

Cymothoa Flow

cymothoa

Post Exploitation & Backdooring Procedure with cymothoa.

cymothoa

Must Need

Autocrack

Autocrack – Hashcat Wrapper To Help Automate The Cracking Process

Autocrack is python script is a Hashcat wrapper to help automate the cracking process. The script includes multiple functions to select a set of...
NodeJsScan

NodeJsScan – Static Security Code Scanner For Node.js Applications

NodeJsScan is a static security code scanner (SAST) for Node.js applications. Configure & Run Install Postgres and configure SQLALCHEMY_DATABASE_URI in core/settings.py pip3 install -r requirements.txt python3 migrate.py #...
ParamPamPam

ParamPamPam : Tool For Brute Discover Parameters

ParamPamPam is a tool for brute discover GET and POST parameters Installation With Docker ,Install...
Bheem : Tool To Carry Out Various Tools And Recon Process

Bheem : Tool To Carry Out Various Tools And Recon Process

Project Bheem is a simple collection of small bash-scripts which runs iteratively to carry out various tools and recon process & store...
LiveHiddenCamera : Library Which Record Live Video & Audio From Android Device Without Displaying A Preview

LiveHiddenCamera : Library Which Record Live Video & Audio From Android...

LiveHiddenCamera is a library which record live video and audio from Android device without displaying a preview.
Scout2

Scout2 – Security Auditing Tool For AWS Environments

Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual...
Drow : Injects Code Into ELF Executables Post-Build

Drow : Injects Code Into ELF Executables Post-Build

Drow is a command-line utility that is used to inject code and hook the entrypoint of ELF executables (post-build). It takes unmodified...