Friday, July 23, 2021
Home Tags Conpot

Tag: Conpot

Must Need

CIMplant : C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems

CIMplant : C# Port Of WMImplant Which Uses Either CIM Or...

C# port of WMImplant which uses either CIM or WMI to query remote systems. It can use provided credentials or the current...
Dfirtrack

Dfirtrack : The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend.
Interactsh : An OOB Interaction Gathering Server And Client Library

Interactsh : An OOB Interaction Gathering Server And Client Library

Interactsh is an Open-Source Solution for Out of band Data Extraction, A tool designed to detect bugs that cause external interactions, For example...
reaver

Reaver + PixieWPS – Tool to Bruteforce the WPS of a...

Reaver is a tool to brute-force the WPS of a WIFi router. PixeWPS is a new tool to brute-force the exchanging keys during a...
Caldera : An Automated Adversary Emulation System

Caldera : An Automated Adversary Emulation System

CALDERA is an automated adversary emulation system, built on the MITRE ATT&CK™ framework. It works by attaching abilities to an adversary and running...
FireStorePwn : Firestore Database Vulnerability Scanner Using APKs

FireStorePwn : Firestore Database Vulnerability Scanner Using APKs

FireStorePwn scans an APK and checks the Firestore database for rules that are not secure, testing with or without authentication.
Attack Range  : Tool To Simulate Attacks Against & Collect Data Into Splunk

Attack Range : Tool To Simulate Attacks Against & Collect...

Attack Range is a tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against...