Friday, March 5, 2021
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa5

cymothoa5

cymothoa

Infecting a process with Cymothoa

Cymothoa
cymothoa

Must Need

WPScan

WPScan : WordPress Vulnerability Scanner Written for Security Professionals

WPScan is a free, for non-commercial use, black box WordPress vulnerability scanner written for security professionals and blog maintainers to...
NAXSI

NAXSI : WAF For NGINX

NAXSI is an Open-Source, High Performance, Low Rules Maintenance WAF For NGINX. NAXSI means Nginx Anti XSS & SQL Injection.
XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XposedOrNot or XoN tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage...
Threat_Note : DPS’ Lightweight Investigation Notebook

Threat_Note : DPS’ Lightweight Investigation Notebook

threat_note is a web application built by Defense Point Security to allow security researchers the ability to add and retrieve ...
Progress Burp : Burp Suite Extension To Track Vulnerability Assessment Progress

Progress Burp : Burp Suite Extension To Track Vulnerability Assessment Progress

Progress Burp Suite extension to track vulnerability assessment progress. Features Capture items (unique requests) from...
CyberChef

CyberChef – A web App For Encryption, Encoding, Compression & Data...

CyberChef is a simple, intuitive web app for carrying out all manner of "cyber" operations within a web browser. These operations include simple encoding...
ct-exposer

ct-exposer : An OSINT Tool That Discovers Sub-Domains By Searching Certificate...

ct-exposer will query the CT logs for a given domain, and then try to do DNS lookups for the domains to see which ones...