Thursday, October 1, 2020
Home Tags Google

Tag: Google

Must Need

WinPwn : Automation for Internal Windows Penetrationtest / AD-Security

WinPwn : Automation for Internal Windows Penetrationtest / AD-Security

WinPwn is a automation for internal Windows Penetrationtest / AD-Security. In many past internal penetration tests I often had problems with the...
thc-ssl-dos

THC-SSL-DOS – DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation

THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a website or server is...
Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
Kube-Hunter

Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes...
WDExtract : Extract Windows Defender database

WDExtract : Extract Windows Defender database

WDExtract is the extract Windows Defender database from vdm files and unpack it. This program distributed as-is, without any...
Flerken : Obfuscated Command Detection Tool

Flerken : Obfuscated Command Detection Tool

Flerken is an Open-source obfuscated command detection tool. Command line obfuscation has been proved to be a non-negligible factor in file-less malware...
Manati : A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts

Manati : A Web-Based Tool To Assist The Work Of The...

The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery...