Friday, July 23, 2021
Home Tags Cotopaxi

Tag: Cotopaxi

Must Need

Xerror : An Automated Penetration Tool

Xerror : An Automated Penetration Tool

Xerror is an automated penetration tool , which will help security professionals and non professionals to automate their pen testing tasks. Xerror...
Ghidra-Evm : Module For Reverse Engineering Smart Contracts

Ghidra-Evm : Module For Reverse Engineering Smart Contracts

Ghidra-Evm in the last few years, attacks on deployed smart contracts in the Ethereum blockchain have ended up in a significant amount...
RedGhost : Linux Post Exploitation Framework

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
LeakLooker

LeakLooker : Find open databases with Shodan

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results from Shodan,...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
Ehtools : Penetration Tools That Can Be Explored Easily

Ehtools : Penetration Tools That Can Be Explored Easily

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that...
Dejavu

Dejavu – Open Source Deception Framework

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...