Tuesday, March 2, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation Cymothoa Flow

Cymothoa Flow

cymothoa

Post Exploitation & Backdooring Procedure with cymothoa.

cymothoa

Must Need

PcapXray : Tool To Visualize A Packet Capture Offline

PcapXray : Tool To Visualize A Packet Capture Offline

PcapXray is a Network Forensics Tool to visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication...
Scallion : GPU-Based Onion Hash Generator

Scallion : GPU-Based Onion Hash Generator

Scallion lets you create vanity GPG keys and .onion addresses (for Tor's hidden services) using OpenCL. It runs on Mono (tested in...
TimeWarrior : Commandline Time Reporting

TimeWarrior : Commandline Time Reporting

Timewarrior is a time tracking utility that offers simple stopwatch features as well as sophisticated calendar-based backfill, along with flexible reporting. It...
SQLMap v1.4.9 : Automatic SQL Injection & Database Takeover Tool

SQLMap v1.4.9 : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256. Usage Usage:...
Delta

Delta – SDN Security Evaluation & Penetration Testing Framework

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown...
KillChain : A Unified Console To Perform The “Kill Chain” Stages Of Attacks

KillChain : A Unified Console To Perform The “Kill Chain” Stages...

Kill Chain is a unified console with an anonymize that will perform these stages of attacks: ReconnaissanceWeaponizationDeliveryExploitInstallationCommand & ControlAnd...