Wednesday, October 24, 2018
Home Tags Attack

Tag: attack

Must Need

WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Mr SIP

Mr SIP : SIP-Based Audit and Attack Tool

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help...
DigiDuck

DigiDuck – Framework for Digiduck Development Boards Running ATTiny85 Processors &...

Framework for Digiduck Development Boards running ATTiny85 processors and micronucleus bootloader! DigiDuck Installation DigiDuck Framework (Referred to as DDF) is really simple to start and setup!...
MalwareCMDMonitor

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On...

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In a nutshell, it downloads...
Frisky

Frisky – Tools To Assist Binary App Reversing & Augmentation

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...
Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...
BurpSuite Extension Ruby

BurpSuite Extension Ruby : Template to speed up building a...

Due the lake of examples and implementations of BurpSuite Extension Ruby, we have decided to make it easy for all rubyists to have a...