Friday, July 23, 2021
Home Tags Cryptondie

Tag: Cryptondie

Must Need

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

GIVINGSTORM is a breeze to use. Simply clone the directory, and cd into it. The beginnings of a C2 framework. Currently without...
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
WAF-A-MoLE : A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls

WAF-A-MoLE : A Guided Mutation-Based Fuzzer For ML-based Web Application Firewalls

WAF-A-MoLE is a guided mutation-based fuzzer for ML-based Web Application Firewalls, inspired by AFL and based on the FuzzingBook by Andreas Zeller et al.
DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response

DFIRTriage : Digital Forensic Acquisition Tool For Windows Based Incident Response

DFIRTriage is a Digital forensic acquisition tool for Windows-based incident response. This tool intended to provide Incident Responders with rapid host...
CatchYou : FUD Win32 Msfvenom Payload Generator

CatchYou : FUD Win32 Msfvenom Payload Generator

CatchYou is a tool used for FUD win32 msfvenom payload generator(meterpreter/shell reverse tcp).
Gundog : Guided Hunting In Microsoft 365 Defender

Gundog : Guided Hunting In Microsoft 365 Defender

gundog - PowerShell based guided hunting in Microsoft 365 Defender Gundog provides you with guided hunting in Microsoft 365...
Pulsar : Network Footprint Scanner Platform

Pulsar : Network Footprint Scanner Platform

Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization public facing...