Thursday, June 17, 2021
Home Tags Attacks

Tag: Attacks

Must Need

Ghost : Android Debug Bridge To Remotely Access An Android Device

Ghost : Android Debug Bridge To Remotely Access An Android Device

Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. It...
Tinfoil Chat – Onion Routed, Endpoint Secure Messaging System

Tinfoil Chat – Onion Routed, Endpoint Secure Messaging System

Tinfoil Chat (TFC) is a FOSS+FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from passive collection,...
ProcDump

ProcDump : A Linux Version of the ProcDump Sysinternals Tool

It is a Linux re-imagining of the classic ProcDump tool from the Sysinternals suite of tools for Windows. It...
PacVim

PacVim – A Game That Teaches You Vim Commands

PacVim is a free open source, text-based game that teaches you vim commands in a simple and fun manner.  In spite of the fact...
How to Make More Money as a Cyber Security Expert – Everything You Need to Know

How to Make More Money as a Cyber Security Expert –...

You have chosen a niche of immense capacity. The market size of cybersecurity is expected to swell from 137.6 Billion USD dollars...
AutoSploit and AutoScanner

AutoNSE – Massive NSE AutoSploit and AutoScanner

Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and adaptable features. It enables...
Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

Covenant : A .NET Command & Control Framework That Aims To...

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive...