Friday, July 23, 2021
Home Tags Enterprise security

Tag: enterprise security

Must Need

Kemon

Kemon – An Open-Source Pre & Post Callback-Based Framework For macOS...

Kemon is an open-source Pre and Post callback-based framework for macOS kernel monitoring. With the power of it, we can easily implement LPC communication...
WhatTheHack : A Collection Of Challenge Based Hack

WhatTheHack : A Collection Of Challenge Based Hack

WhattheHack is a challenge based hackathon format. A collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code...
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

Sublert : Security & Reconnaissance Tool Which Leverages Certificate Transparency

Sublert is a security and reconnaissance tool which leverages certificate transparency to automatically monitor new subdomains deployed by specific organizations and issued...
TheCl0n3r : Tool To Download & Manage Your Git Repositories

TheCl0n3r : Tool To Download & Manage Your Git Repositories

TheCl0n3r will allow you to download and manage your git repositories. About 90% of the penetration testing tools used in my experience...
Eviloffice : Inject Macro & DDE Code Into Excel & Word Documents

Eviloffice : Inject Macro & DDE Code Into Excel & Word...

Eviloffice is a tool used to inject macro and DDE code into Excel and Word documents (reverse shell).
Shodanwave

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that...