Friday, April 3, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa6

cymothoa6

cymothoa
cymothoa
cymothoa

Must Need

Linux Smart Enumeration : Tool For Pentesting & CTFs With Verbosity Levels

Linux Smart Enumeration : Tool For Pentesting & CTFs With Verbosity...

Linux Smart Enumeration is a tool for pentesting and CTFs with verbosity levels. This script will show relevant information about the...

Five Benefits That Will Convince You to Integrate Your Systems

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad thing. It has...
DVIA

DVIA – Damn Vulnerable iOS Application

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...
Risk Assessment Framework : Static Application Security Testing

Risk Assessment Framework : Static Application Security Testing

The OWASP Risk Assessment Framework consist of Static application security testing and Risk Assessment tools, Eventhough there are many SAST tools available...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
ADAudit  : Powershell Script To Do Domain Auditing Automation

ADAudit : Powershell Script To Do Domain Auditing Automation

ADAudit is a PowerShell Script to perform a quick AD audit. If you have any decent powershell one liners that could...
ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting : A Splunk App Mapped To MITRE ATT&CK

ThreatHunting is a Splunk application containing several dashboards and over 120 reports that will facilitate initial hunting indicators to investigate.