Monday, June 21, 2021
Home Tags Attacker Groups

Tag: Attacker Groups

Must Need

What Should Be Included in Your Independent Contractor Agreement?

What Should Be Included in Your Independent Contractor Agreement?

In any business partnership, contracts are a must, but they are especially essential for independent contractors to:  Legally Protect Develop...
Pickl3 : Windows Active User Credential Phishing Tool

Pickl3 : Windows Active User Credential Phishing Tool

Pickl3 is a Windows active user credential phishing tool.You can execute the Pickl3 and phish the target user credential.
RITA : Real Intelligence Threat Analytics

RITA : Real Intelligence Threat Analytics

RITA is a real intelligence threat analytics. RITA is an open source framework for network traffic analysis. The framework...
Urlhunter : A Recon Tool That Allows Searching On URLs That Are Exposed Via Shortener Services

Urlhunter : A Recon Tool That Allows Searching On URLs That...

Urlhunter is a recon tool that allows searching on URLs that are exposed via shortener services such as bit.ly and goo.gl. The...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...
Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land on during...
Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis & Function Clustering

Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis &...

Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built...