Wednesday, February 19, 2020
Home Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System msf2-10

msf2-10

msfconsole

Adding Workspace & Swtching to it

Nmap

Must Need

BruteX

BruteX – Automatically Brute Force All Services Running On A Target

BruteX is a tool to automatically brute force all services running on a target. As you all know...
Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

Airflowscan is a checklist and tools for increasing security of Apache Airflow. The purpose of this project is provide tools to increase...
Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

Uac-A-Mola : Tool For Security Researchers To Investigate New UAC Bypasses

UAC-A-Mola is a tool that allows security researchers to investigate new UAC bypasses, in addition to detecting and exploiting known bypasses. UAC-A-mola has...
Mutiny Fuzzer

Mutiny Fuzzer : Network Fuzzer Replaying PCAPs Through a Mutational Fuzzer

The Mutiny Fuzzer Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to...
EvilClippy

EvilClippy : For Creating Malicious MS Office Documents

EvilClippy is a cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse...
Tishna : Automated Web Application Hacker 2020

Tishna : Automated Web Application Hacker 2020

Tishna is an complete Automated pentest framework for Servers, Application Layer to Web Security. This software have 62 Options with full...
Shell Backdoor List : PHP / ASP Shell Backdoor List

Shell Backdoor List : PHP / ASP Shell Backdoor List

Shell Backdoor is a malicious piece of code (e.g. PHP, Python, Ruby) that can be uploaded to a site to gain...