Wednesday, June 16, 2021
Home Tags Attacking

Tag: Attacking

Must Need

AhMyth

AhMyth Android Rat – Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration Tool. It consists of two parts : Server side : Desktop application based on electron framework...
IoT Home Guard

IoT Home Guard : A Tool for Malicious Behavior Detection in...

IoT Home Guard is a project to help people discover malware in smart home devices. For users the project...
Self XSS  :  Grab Cookies Tricking Users Into Running Malicious Code

Self XSS : Grab Cookies Tricking Users Into Running...

Self XSS attack using bit.ly to grab cookies tricking users into running malicious code. How it works?
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
RogueWinRM : Windows Local Privilege Escalation From Service Account To System

RogueWinRM : Windows Local Privilege Escalation From Service Account To System

RogueWinRM is a local privilege escalation exploit that allows to escalate from a Service account (with SeImpersonatePrivilege) to Local System account if...
RPI Hunter

RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry

rpi hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...
Invoke-Antivm : Powershell Tool For VM Evasion

Invoke-Antivm : Powershell Tool For VM Evasion

Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell. Compatibility