Saturday, January 16, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa12

cymothoa12

cymothoa

Netcat Connection to Cymothoa Backdoor

cymothoa
Cymothoa

Must Need

HyperDbg : The Source Code Of HyperDbg Debugger

HyperDbg : The Source Code Of HyperDbg Debugger

HyperDbg is designed with a focus on using modern hardware technologies to provide new features to the reverse engineering world. It operates...
CTFTool : Interactive CTF Exploration Tool

CTFTool : Interactive CTF Exploration Tool

This is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used on Windows to implement Text Services....
Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded...

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper
Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....

Burp Extensions – Burp Suite Extensions For The New Burp Suite...

Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
ABD : Course Materials For Advanced Binary Deobfuscation

ABD : Course Materials For Advanced Binary Deobfuscation

ABD is the course materials for Advanced Binary Deobfuscation by NTT Secure Platform Laboratories Advanced Binary Deobfuscation