Tuesday, March 2, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa4

cymothoa4

cymothoa

Running Processes in the victim

cymothoa
cymothoa

Must Need

PYWhatCMS

PYWhatCMS – Unofficial WhatCMS API Package

PyWhatCMS is a python package for whatcms.com API. This package provides a simple way to use the whatcms.org API for detecting 467...
BootStomp

BootStomp – A Bootloader Vulnerability Bug Finder

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage...
One-Lin3r : Gives You One Liners That Aids In Penetration Testing Operations

One-Lin3r : Gives You One Liners That Aids In Penetration Testing...

One-Lin3r is simple modular and light-weight framework gives you all the one-liners that you will need while penetration testing (Windows, ...
Polypyus : Locate Functions In Raw Binaries By Extracting Known Functions

Polypyus : Locate Functions In Raw Binaries By Extracting Known Functions

Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus...
ARDT

ARDT : Akamai Reflective DDoS Tool

Attack the origin host behind the Akamai Edge hosts and bypass the DDoS protection offered by Akamai services.
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...