Wednesday, February 19, 2020
Home lbd – Tool to Detect Whether a Domain has Load Balancing Enabled loadbalance

loadbalance

lbd

Typical Load Balancing Schematic

lbd
lbd

Must Need

CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via SMB

CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via...

CredNinja is a multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale...
MASC : A Web Malware Scanner

MASC : A Web Malware Scanner

MASC is a malware (web) scanner developed during CyperCamp Hackathon 2017. At the moment, there are some features available for any type...
FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell & .NET

FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3,...

FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining, and usage...
phishing

ReelPhish – A Real-Time Two-Factor Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the...
Ehtools : Penetration Tools That Can Be Explored Easily

Ehtools : Penetration Tools That Can Be Explored Easily

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that...
Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security & Penetration Test Techniques

Docker Security Playground : A Microservices-Based Framework For The Study Of...

Docker Security Playground is an application that allows you to: Create network and network security scenarios, in order to...
Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

Eaphammer : Targeted Evil Twin Attacks Against Wpa2-Enterprise Networks

EAPHammer is a toolkit for performing targeted evil twin attacks against WPA2-Enterprise networks. It is designed to be used in full scope...