Friday, July 23, 2021
Home Tags DDoor

Tag: DDoor

Must Need

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

GIVINGSTORM is a breeze to use. Simply clone the directory, and cd into it. The beginnings of a C2 framework. Currently without...

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep...
Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 : Command and Control for C# Writing

Telegra Csharp C2 is a tool for command and control for C# Writing. TelegramBotClient allows you to use a proxy for Bot...
GTFO : Search For Unix Binaries To Bypass System Security Restrictions

GTFO : Search For Unix Binaries To Bypass System Security Restrictions

GTFO is a tool used to search for Unix binaries that can be exploited to bypass system security restrictions.
Bughound : Static Code Analysis Tool Based On Elastic search

Bughound : Static Code Analysis Tool Based On Elastic search

Bughound is an open-source static code analysis tool that analyzes your code and sends the results to Elasticsearch and Kibana to get...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...