Friday, April 10, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation Cymothoa Flow

Cymothoa Flow

cymothoa

Post Exploitation & Backdooring Procedure with cymothoa.

cymothoa

Must Need

Linux Autopilot

Linux-based Autopilot and Other Technologies in Cars

The popularity of Linux in the world is gaining momentum. This is because in many areas it is recognized as better than...
Sylkie

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery...
Passpie : Multiplatform Command-line Password Manager

Passpie : Multiplatform Command-line Password Manager

Passpie is a command line tool to manage passwords from the terminal with a colorful and configurable interface. Use a master passphrase...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
LaravelN00b : Automated Scan .env Files & Checking Debug Mode In Victim Host

LaravelN00b : Automated Scan .env Files & Checking Debug Mode In...

Incorrect configuration allows you to access .env files or reading env variables. LaravelN00b automated scan .env files and checking debug mode...
MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan : Volatility Plugin For Extracts Configuration Data Of Known Malware

MalConfScan is a Volatility plugin extracts configuration data of known malware. Volatility is an open-source memory forensics framework for incident response and malware analysis. This...
SKA : Simple Karma Attack

SKA : Simple Karma Attack

SKA allows you to implement a very simple and fast karma attack. You can sniff probe requests to choice...