Wednesday, July 28, 2021
Home Tags Encryption Systems

Tag: Encryption Systems

Must Need

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin idea is to "translate" Windows OS privileges to a path leading to: administrator,integrity and/or confidentiality threat,availability threat,just a...
GithubFind3r : Fast Command Line Repo/User/Commit Search Tool

GithubFind3r : Fast Command Line Repo/User/Commit Search Tool

GithubFind3r is a very fast command line repo/user/commit search tool. Also Read -...
Sh00t

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy,...
AhMyth

AhMyth Android Rat – Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration Tool. It consists of two parts : Server side : Desktop application based on electron framework...
WindowsSpyBlocker

WindowsSpyBlocker – Block Spying & Tracking On Windows

WindowsSpyBlocker is an application written in Go and delivered as a single executable to block spying and tracking on Windows systems. The initial approach...
SharpStat : C# Utility That Uses WMI To Run CMD

SharpStat : C# Utility That Uses WMI To Run CMD

SharpStat is a C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use...
Open Group

Process of Becoming The Open Group TOGAF 9-Certified through OG0-091 and...

Certifications from a global association like The Open Group are more than just skill validation. It’s apparently a manner of etching your...