Sunday, June 13, 2021
Home Tags Arbitrary

Tag: Arbitrary

Must Need

Lockphish : A Tool For Phishing Attacks On The Lock Screen

Lockphish : A Tool For Phishing Attacks On The Lock Screen

Lockphish it's the first tool (05/13/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone...
Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor is Python application written to enhance security monitoring capabilities of Windows 7/2008 (and all later versions) workstations/servers and...
Sak1to-Shell : Multi-threaded C2 Server & Reverse Shell Client Written In Pure C

Sak1to-Shell : Multi-threaded C2 Server & Reverse Shell Client Written In...

Sak1to-Shell is a multi-threaded c2 server and reverse TCP shell client written in pure C (Windows). Command List
How much do Background Checks know About You?

How much do Background Checks know About You?

With an increasing demand for background checks to be completed before signing most major contracts (like employment, renting a property, or even...
Iris : WinDbg Extension To Display Windows Process Mitigations

Iris : WinDbg Extension To Display Windows Process Mitigations

Iris WinDbg extension performs detection of common Windows process mitigations (32 and 64 bits).
H2T

H2T : HTTP Hardening Tool Scans Website & Suggests Security Headers...

H2T is a simple tool to help sysadmins to hardening their websites. Until now h2t checks the website headers and recommends how to...
MIG : Distributed & Real Time Digital Forensics At The Speed Of The Cloud

MIG : Distributed & Real Time Digital Forensics At The Speed...

MIG is Mozilla's platform for investigative surgery of remote endpoints. You can spin up a local-only MIG setup using docker.