Tuesday, July 27, 2021
Home Tags DorkX

Tag: DorkX

Must Need

Archery

Archery – Open Source Vulnerability Assessment & Management Helps Developers &...

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource...
Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in the post...
Jaeles : The Swiss Army Knife For Automated Web Application Testing

Jaeles : The Swiss Army Knife For Automated Web Application Testing

Jaeles is a powerful, flexible and easily extensible framework written in Go for building your own Web Application Scanner.
Spyeye : Script To Generate Win32 .exe File To Take Screenshots

Spyeye : Script To Generate Win32 .exe File To Take Screenshots

SpyEye is a script to generate Win32 .exe file to take screenshots every ~10 seconds. Features

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep...
PowerShell Red Team : Collection Of PowerShell Functions

PowerShell Red Team : Collection Of PowerShell Functions

Collection of PowerShell functions a Red Teamer may use to collect data from a machine or gain access to a target. I...
Swift-Attack : Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods

Swift-Attack : Unit Tests For Blue Teams To Aid With Building...

Swift-Attack is a unit tests for blue teams to aid with building detections for some common macOS post exploitation methods. I have...