Wednesday, November 13, 2019
Home Tags GDB

Tag: GDB

Must Need

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for all your...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Winspy

Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP...

WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisene. Dependencies metasploit-framework xterm apache2 Also ReadEvilginx2 – Standalone MITM Attack Framework Used For...
RedGhost : Linux Post Exploitation Framework

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
BLEAH

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead...
MemProcFS : The Memory Process File System

MemProcFS : The Memory Process File System

MemProcFS the Memory Process File System is an easy and convenient way of accessing physical memory as files a virtual file system....
Lightbulb Framework

Lightbulb Framework : Tools For Auditing WAFS

LightBulb Framework is an open source python framework for auditing web application firewalls and filters. LightBulb Framework Synopsis The framework consists of two main algorithms: GOFA: An active...