Monday, June 1, 2020
Home Tags DVHMA

Tag: DVHMA

Must Need

Kippo – SSH Honeypot

Kippo – SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by...
ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid Subdomains Using Active Bruteforce

ShuffleDNS : Wrapper Around Massdns Written In Go To Enumerate Valid...

ShuffleDNS is a wrapper around massdns written in go that allows you to enumerate valid subdomains using active bruteforce as well...
Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

Pockint : A Portable OSINT Swiss Army Knife for DFIR/OSINT Professionals

POCKINT (a.k.a. Pocket Intelligence) is the OSINT swiss army knife for DFIR/OSINT professionals. Designed to be a lightweight and portable GUI...
Mcreator

Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s

Mcreator is an Encoded Reverse Shell Generator With Techniques To Bypass AV's. Mcreator Installation git clone https://github.com/blacknbunny/mcreator.git && cd mcreator/ && python mcreator.py Also ReadVba2Graph – Generate...
Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded Firmware

Karonte : Static Analysis Tool To Detect Multi-Binary Vulnerabilities In Embedded...

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware. Research Paper
SWFPFinder : SWF Potential Parameters Finder

SWFPFinder : SWF Potential Parameters Finder

SWFPFinder is a simple and open source bash script designed to discovery the potential swf (file) parameters on the webapp analysing...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java-scripts & shell-codes. It...