Wednesday, January 22, 2020
Home Tags Breached Emails

Tag: Breached Emails

Must Need

XXRF Shots

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class where attacker sends crafted...
PostShell – Post Exploitation Bind/Backconnect Shell

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
Ph0neutria : Malware Zoo Builder That Sources Samples Straight From The Wild

Ph0neutria : Malware Zoo Builder That Sources Samples Straight From The...

Ph0neutria is a malware zoo builder that sources samples straight from the wild. Everything is stored in Viper for ease of access...
Seth : Perform A MitM Attack & Extract Clear Text Credentials From RDP Connections

Seth : Perform A MitM Attack & Extract Clear Text Credentials...

Seth is a tool written in Python and Bash to MitM RDP connections by attempting to downgrade the connection in order to...
Drltrace

Drltrace – A Library Calls Tracer For Windows & Linux Applications

Drltrace is a dynamic API calls tracer for Windows and Linux applications designed primarily for malware analysis. Drltrace is built on top of DynamoRIO...