Wednesday, April 14, 2021
Home Tags BadOutlook

Tag: BadOutlook

Must Need

PowerSploit : A PowerShell Post-Exploitation Framework

PowerSploit : A PowerShell Post-Exploitation Framework

PowerSploit is a collection of Microsoft PowerShell modules that can be used to aid penetration testers during all phases of an assessment....
Hmmcookies – Grab Cookies From Firefox, Chrome & Opera

Hmmcookies – Grab Cookies From Firefox, Chrome & Opera

Hmmcookies is a tool used to grab cookies from Firefox, Chrome, Opera using a shortcut file (bypass UAC).
What is Sales CRM Software and How Does it Benefit SMBs?

What is Sales CRM Software and How Does it Benefit SMBs?

A Sales CRM software is what your business may need more desperately than you know! While there are many benefits of sales...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )
TLS-Scanner

TLS-Scanner : The TLS-Scanner Module from TLS-Attacker

TLS-Scanner is a tool created by the Chair for Network and Data Security from the Ruhr-University Bochum to assist pentesters and security researchers in...
Jeopardize : A Low Cost Threat Intelligence&Response Tool

Jeopardize : A Low Cost Threat Intelligence&Response Tool

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat...
Adama : Searches For Threat Hunting & Security Analytics

Adama : Searches For Threat Hunting & Security Analytics

Adama is a tool for searches for threat hunting and security analytics. A collection of known log and / or event...