Saturday, January 16, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa10

cymothoa10

cymothoa
cymothoa
cymothoa

Must Need

DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis

B2R2 : A Collection of Algorithms, Functions And Tools For Binary...

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis written purely in F# (in .NET lingo, it is...
AWSPX : A Graph-Based Tool For Visualizing Effective Access

AWSPX : A Graph-Based Tool For Visualizing Effective Access

AWSPX is a graph-based tool for visualizing effective access and resource relationships within AWS. It resolves policy information to determine what actions...
Joomscan

Joomscan – OWASP Joomla Vulnerability Scanner Project

OWASP JoomScan is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them. If you want to do a...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
LKWA : Lesser Known Web Attack Lab

LKWA : Lesser Known Web Attack Lab

LKWA or Lesser Known Web Attack Lab is for intermediate pentester that can test and practice lesser known web attacks...

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...