Saturday, July 24, 2021
Home Tags Encrypts

Tag: Encrypts

Must Need

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
PHPMussel

PHPMussel : Anti-Virus Anti-Trojan Anti-Malware Solution

An ideal solution for shared hosting environments, where it's often not possible to utilise or install conventional anti-virus protection solutions,...
BurpBounty

BurpBounty – Active and Passive Scan Check Builder

BurpBounty permits you, in a speedy and basic way, to enhance the active and passive burpbounty suite scanner by methods for customized rules through...
Iris : WinDbg Extension To Display Windows Process Mitigations

Iris : WinDbg Extension To Display Windows Process Mitigations

Iris WinDbg extension performs detection of common Windows process mitigations (32 and 64 bits).
Five Tips for Hiring a Developer to Create the Perfect App

Five Tips for Hiring a Developer to Create the Perfect App

You could attempt to design and implement a new app along with your existing team, but you’ll probably end up regretting your decision. Although...
Mythic : A Collaborative, Multi-Platform, Red Teaming Framework

Mythic : A Collaborative, Multi-Platform, Red Teaming Framework

Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide...
Pocsuite3

Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework

Pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team. It comes with...