Friday, April 3, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa11

cymothoa11

cymothoa

Cymothoa being Downloaded in Kali Linux Attacker machine.

cymothoa
cymothoa

Must Need

Fluxion

Fluxion – Remake Of Linset By VK496 With Less Bugs &...

Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by...
Hijacker

All-in-One Wi-Fi Cracking Tools for Android – Hijacker v1.5

Hijacker v1.5 is a Graphical User Interface for the penetration testing instruments Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a basic and simple UI...
BootStomp

BootStomp – A Bootloader Vulnerability Bug Finder

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage...
LAPSToolkit

LAPSToolkit : Tool to Audit & Attack LAPS Environments

LAPSToolkit functions written in PowerShell that leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft's Local Administrator Password...

EfiGuard – Disable PatchGuard and DSE at Boot Time

EfiGuard is a portable x64 UEFI bootkit that patches the Windows boot manager, boot loader and kernel at boot time in...
S3TK : A Security Toolkit For Amazon S3

S3TK : A Security Toolkit For Amazon S3

S3TK is a security toolkit for Amazon S3. Installation
Armory

Armory : A Tool Meant to Take in a Lot of...

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it...