Thursday, March 21, 2019
Home Tags Chomp-Scan

Tag: Chomp-Scan

Must Need

FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
Joomscan

Joomscan – OWASP Joomla Vulnerability Scanner Project

OWASP JoomScan is an opensource project in perl programming language to detect Joomla CMS vulnerabilities and analysis them. If you want to do a...
Gcat

Gcat – Sneaking Backdoor Use Gmail As A Command &...

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC...
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...
Air-Hammer

Air-Hammer – A Online Brute-Force Attack Tool

Air-Hammer is an online brute-force attack tool for use against WPA Enterprise networks. Despite the fact that WPA Enterprise is regularly viewed as "more...
Killshot

Killshot : Information gathering Tool

KillShot is a Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner. You Can use this tool to Spider your website and get important...