Saturday, October 19, 2019
Home Tags Browser Exploitation

Tag: Browser Exploitation

Must Need

PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its' easy printable visuals and...
Ache

Ache – Web Crawler For Domain-Specific Search

ACHE is a focused web crawler. It collects web pages that satisfy some specific criteria, e.g., pages that belong to a given domain or...
CommandoVM

CommandoVM : Windows-Based Security Distribution for Penetration Testing

Welcome to CommandoVM a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install Script)
Windows Hacks : Creative & Unusual Things That Can Be Done With The Windows API

Windows Hacks : Creative & Unusual Things That Can Be Done...

Windows Hacks is a creative and unusual things that can be done with the Windows API. Shrinking Windows
LAPSToolkit

LAPSToolkit : Tool to Audit & Attack LAPS Environments

LAPSToolkit functions written in PowerShell that leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft's Local Administrator Password...
MSNM Sensor – Multivariate Statistical Network Monitoring Sensor

MSNM Sensor – Multivariate Statistical Network Monitoring Sensor

MSNM Sensor (Multivariate Statistical Network Monitoring-Sensor) shows the practical suitability of the approaches found in PCA-MSNM and in Hierarchical PCA-MSNM works....
SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...