Sunday, March 29, 2020
Home Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation cymothoa7

cymothoa7

cymothoa
cymothoa
cymothoa

Must Need

How to find the dissertation writing service

Writing a dissertation is a daunting prospect and the something that lots of students and PHD candidates dread. Even right after years of schooling...
Pftriage

Pftriage : Python Tool & Library To Help Analyse Files During...

Pftriage is a tool to help analyze files during malware triage. It allows an analyst to quickly view and extract properties of...
Twitter-Intelligence

Twitter-Intelligence : OSINT Project Performs Tracking & Analysis Of The Twitter

Twitter-Intelligence is a project written in Python to twitter tracking and analysis without using Twitter API. This project is a Python 3.x application. The...
XenoScan

XenoScan – Open source memory scanner written in C++

XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These...
Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools : ShellReverse TCP/UDP/ICMP/DNS/SSL/BINDTCP & AV Bypass, AMSI Patched

Salsa Tools is a collection of three different tools that combined, allows you to get a reverse shell on steroids in...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
SET : The Social-Engineer Toolkit Repository From TrustedSec

SET : The Social-Engineer Toolkit Repository From TrustedSec

The Social-Engineer Toolkit is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that...