Wednesday, November 20, 2019
Home Tags Detection

Tag: detection

Must Need

yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...
ThreatIngestor  : Extract & Aggregate Threat Intelligence

ThreatIngestor : Extract & Aggregate Threat Intelligence

ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and...

ZIP File Raider – Burp Extension for ZIP File Payload Testing

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily inject Burp Scanner/Repeater payloads...
Webtech

Webtech : Identify Technologies Used on Websites

We’re very proud to release WebTech as open-source software. WebTech is a Python software that can identify web technologies by visiting a...
Mcreator

Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s

Mcreator is an Encoded Reverse Shell Generator With Techniques To Bypass AV's. Mcreator Installation git clone https://github.com/blacknbunny/mcreator.git && cd mcreator/ && python mcreator.py Also ReadVba2Graph – Generate...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Terraform AWS Secure Baseline :  To Set Up Your AWS Account

Terraform AWS Secure Baseline : To Set Up Your AWS...

Terraform Aws Secure Baseline is a terraform module to set up your AWS account with the secure baseline configuration based on CIS...