Sunday, March 29, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa10

cymothoa10

cymothoa
cymothoa
cymothoa

Must Need

Lava : Large-scale Automated Vulnerability Addition

Lava : Large-scale Automated Vulnerability Addition

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has known bugs...

Tips for Recovering the data easily

Recovering data has been mysterious job for a long time once users lost data and then have to ask some experts to do...
ReverseAPK

ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications

Now and then, you may have a circumstance to figure out your current APKs for legitimate analysis investigation reasons, for example, making queries on...
Tcpreplay

Tcpreplay – Pcap Editing & Replay Tools For UNIX & Windows

Tcpreplay is a suite of GPLv3 licensed utilities for UNIX operating systems for editing and replaying network traffic which was previously captured...
SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of...
Aduket : Straight-forward HTTP Client Testing, Assertions Included

Aduket : Straight-forward HTTP Client Testing, Assertions Included

Aduket Straight-forward HTTP client testing, assertions included. Simple httptest.Server wrapper with a little request recorder spice on it. No special...
QRLJacking

QRLJacking : A New Social Engineering Attack Vector

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that...