Thursday, July 2, 2020
Home Tags DVIA

Tag: DVIA

Must Need

Kali Linux 2020.1 Release

Kali Linux 2020.1 Release

We are incredibly excited to announce the first release of 2020, Kali Linux 2020.1. It includes some exciting new updates:
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...
Two Step Authentication

Mozilla Adds Two Step Authentication Support For Firefox Accounts

Mozilla is propelling a Two Step Authentication process for supporting Firefox accounts. The authentication framework utilizes Firefox Sync usefulness to secure the synchronization of...
Kage

Kage – Graphical User Interface for Metasploit Meterpreter & Session Handler

Kage (ka-geh) is a tool inspired by AhMyth designed for Metasploit RPC Server to interact with meterpreter sessions and generate payloads.For now it...
RedGhost :  Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance & Leaving No Trace

RedGhost : Linux Post Exploitation Framework Designed To Assist Red...

RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
Invisi-Shell

Invisi-Shell : Hide Your Powershell Script In Plain Sight(Bypass all Powershell...

Invisi-Shell is a tool used to hide your powershell script in plain sight! Invisi-Shell bypasses all of Powershell security features (ScriptBlock logging, Module logging,...
ATTACKdatamap  : A Datasource Assessment On An Event Level To Show Potential Coverage

ATTACKdatamap : A Datasource Assessment On An Event Level To...

ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the "MITRE ATT&CK" framework. This tool is developed...