Friday, April 3, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa2

cymothoa2

cymothoa

Change permissions

cymothoa
cymothoa

Must Need

Manati : A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts

Manati : A Web-Based Tool To Assist The Work Of The...

The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery...
PasteHunter : Scanning Pastebin With Yara Rules

PasteHunter : Scanning Pastebin With Yara Rules

PasteHunter is a python3 application that is designed to query a collection of sites that host publicly pasted data. For all the...
SysAnalyzer : Automated Malcode Analysis System

SysAnalyzer : Automated Malcode Analysis System

SysAnalyzer is an application that was designed to give malcode analysts an automated tool to quickly collect, compare, and report on the...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )
Cocospy Keylogger

Monitor Smartphone usage with Cocospy Keylogger

No one can doubt the advantages that smartphones have.  For parents, you now have a dependable babysitter with your smart device.  While...
Stardox : Github Stargazers Information Gathering Tool

Stardox : Github Stargazers Information Gathering Tool

Stardox is an advanced github stargazers information gathering tool. It scraps Github for information and display them in list tree view. It...
Metadata-Attacker

Metadata-Attacker : A Tool To Generate Media Files With Malicious Metadata

Metadata-Attacker is a open source pentesting tools you're able to create an image (.jpg), audio (.mp3) or video (.mp4) file containing your custom metadata...