Wednesday, July 28, 2021
Home Tags Duplicut

Tag: Duplicut

Must Need

PoshC2 : Python Server for PoshC2

PoshC2 : Python Server for PoshC2

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and lateral movement....
Audix : A PowerShell Tool To Quickly Configure Windows Event

Audix : A PowerShell Tool To Quickly Configure Windows Event

Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring. Note: This...

Docker-Inurlbr : Exploit GET / POST Capturing Emails & Urls

Docker-Inurlbr is a advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom...

ZIP File Raider – Burp Extension for ZIP File Payload Testing

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily inject Burp Scanner/Repeater payloads...
Essay Writing

Can’t you Finish your Essay in a Short Time?

Essays are always a mandatory task that is avoided. However it is avoided, essay writing is one of the most important academic...
Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular Expression Denial Of Service)

Regexploit : Find Regular Expressions Which Are Vulnerable To ReDoS (Regular...

Regexploit a tool to Find regexes which are vulnerable to Regular Expression Denial of Service (ReDoS). More info on the...
Wireless Penetration Testing Approach: Kali Linux and Raspberry Pi for Security Analytics

Wireless Penetration Testing Approach: Kali Linux and Raspberry Pi for Security...

As of 2020, we all are aware of the security breaches happening to the data within the organization. The organizations are using...