Friday, July 23, 2021
Home Tags EDR

Tag: EDR

Must Need

Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
TaoWu – A CobaltStrike Toolkit 2020

TaoWu – A CobaltStrike Toolkit 2020

TaoWu is a CobaltStrike toolkit. All the scripts are gathered on the Internet and slightly modified by myself. You can use it...
PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine

PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted...

PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It...
What Are The Components of SQL Server?

What Are The Components of SQL Server?

To make effective use of SQL Server, you need to get to grips with the key components that it consists of and...
Ventoy : A New Bootable USB Solution

Ventoy : A New Bootable USB Solution

Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files.With ventoy, you don't need to format the disk...
Invoker : Penetration Testing Utility

Invoker : Penetration Testing Utility

Invoker is a penetration testing utility. The goal is to use this tool when access to some Windows OS features through...