Wednesday, January 22, 2020
Home Tags 2019

Tag: 2019

Must Need

passive_discovery6

Discover IPv6 Network Range & Hosts from an IPv6 Enabled Network...

Passive_discovery6 passively sniffs the network and dump all client's IPv6 addresses detected. Passive_discovery6 simply sniffs for the neighbor-advertisement packet in IPv6 networks. You have to...
AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in...
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph Theory

Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph...

Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat table...
IotShark : Monitoring And Analyzing IoT Traffic

IotShark : Monitoring And Analyzing IoT Traffic

IoTShark is a IOT monitoring service that allows users to monitor their IOT devices for trends in data sent/received. Ordinarily, setting up...
Hershell

Hershell – Simple TCP Reverse Shell Which Can Work On Multiple...

Hershell is a simple TCP reverse shell written in Go. It uses TLS to secure the communications, and provide a certificate public key fingerprint...
RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...