Sunday, January 17, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa3

cymothoa3

cymothoa

Cymothoa Installed

cymothoa
Cymothoa

Must Need

Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
Elemental : An ATT&CK Threat Library

Elemental : An ATT&CK Threat Library

Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an...
GoDoH : A DNS-Over-HTTPS C2

GoDoH : A DNS-Over-HTTPS C2

GoDoH is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently supported...
Rock-ON : All In One Recon Tool That Will Just Get A Single Entry Of The Domain Name & Do All Of The Work Alone

Rock-ON : All In One Recon Tool That Will Just Get...

Rock-On is a all in one recon tool that will help your Recon process give a boost. It is mainly aimed...
Simple Live Data Collection

Simple Live Data Collection

Simple Live Data Collection. How it works? Build serverConnect with admin and client to serverTo...
Fuzzowski : The Network Protocol Fuzzer

Fuzzowski : The Network Protocol Fuzzer

The idea is to be the Network Protocol Fuzzer that we will want to use. The aim of this tool is...
Trape

Trape – Learn To Track The World & To Avoid Being...

Trape is a recognition tool that allows you to track people, the information you can get is very detailed. Also as large Internet companies...