Wednesday, April 8, 2020
Home Tags Exploit Development

Tag: Exploit Development

Must Need

MIG : Distributed & Real Time Digital Forensics At The Speed Of The Cloud

MIG : Distributed & Real Time Digital Forensics At The Speed...

MIG is Mozilla's platform for investigative surgery of remote endpoints. You can spin up a local-only MIG setup using docker.
Aircrack-NG

Aircrack-NG : Complete Suite Tools To Assess WiFi Network Security

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and...
Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir is a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting.
Subscraper

Subscraper – Tool That Performs Subdomain Enumeration Through Various Techniques

SubScraper uses DNS brute force, Google & Bing scraping, and Virus Total to enumerate subdomains without an API. Written in Python3, SubScraper performs HTTP(S)...
RedPeanut : Small RAT Developed in .Net Core 2 & Its Agent in .Net 3.5 / 4.0

RedPeanut : Small RAT Developed in .Net Core 2 & Its...

RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0. RedPeanut code execution is...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
imR0T

imR0T – Encryption to Your Whatsapp Contact

imR0T : Send a quick message with simple text encryption to your whatsapp contact and , basically in ROT13 with new multi encryption based...