Wednesday, July 28, 2021
Home Tags Endpoint

Tag: Endpoint

Must Need

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
reNgine : An Automated recon Framework For Web Applications

reNgine : An Automated recon Framework For Web Applications

reNgine is an automated reconnaissance framework meant for information gathering during penetration testing of web applications. reNgine has customizable scan engines, which...
Cooolis-MS : A Server That Supports The Metasploit Framework RPC

Cooolis-MS : A Server That Supports The Metasploit Framework RPC

Cooolis-ms is a server that supports Metasploit Framework RPC. It is used to work for Shellcode and PE loader, bypassing the static...
XanXSS

XanXSS : A Simple XSS Finding Tool

XanXSS is a reflected XSS searching tool (DOM coming soon) that creates payloads based from templates. Unlike other XSS scanners that just...
LOLBAS

LOLBAS – Living Off The Land Binaries And Scripts

LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy frontend...
Seeker : Accurately Locate Smartphones Using Social Engineering

Seeker : Accurately Locate Smartphones Using Social Engineering

Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that...
Understanding the Principle of Least Privilege

Understanding the Principle of Least Privilege

With the number of high-profile and catastrophic cybersecurity breaches seeming to grow daily, it’s time for organizations of all sizes to rethink...