Saturday, September 21, 2019
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa1

cymothoa1

cymothoa

Uploading the archive to the victim.

cymothoa
cymothoa

Must Need

SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...
Kippo – SSH Honeypot

Kippo – SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...
H2T

H2T : HTTP Hardening Tool Scans Website & Suggests Security Headers...

H2T is a simple tool to help sysadmins to hardening their websites. Until now h2t checks the website headers and recommends how to...
Sitadel

Sitadel – Web Application Security Scanner

Sitadel is basically an update for WAScan making it compatible for python >= 3.4 It allows more flexibility for you to write new...
Metaforge

Metaforge : An OSINT Metadata Analysing Tool that Filters Through Tags...

Metaforge is an OSINT Metadata analysing tool that filters through tags and creates reports. Please note that it requires at least...
Phantom-Evasion

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most ...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout