Tuesday, June 15, 2021
Home Tags GPO

Tag: GPO

Must Need

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for...
Ninja : Open Source C2 Server Created For Stealth Red Team Operations

Ninja : Open Source C2 Server Created For Stealth Red Team...

Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without...
Delta

Delta – SDN Security Evaluation & Penetration Testing Framework

DELTA is a penetration testing framework that regenerates known attack scenarios for diverse test cases. This framework also provides the capability of discovering unknown...
Widevine L3 Decryptor : A Chrome Extension That Demonstrates Bypassing Widevine L3 DRM

Widevine L3 Decryptor : A Chrome Extension That Demonstrates Bypassing Widevine...

Widevine is a Google-owned DRM system that's in use by many popular streaming services (Netflix, Spotify, etc.) to prevent media content from...
RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces

RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces

RMIScout performs wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation. On...
https://1.bp.blogspot.com/-SA_6pB9S3F8/YIzIHIfLKzI/AAAAAAAAI8Y/q0p8oe3c-KE38VX5VQNTJ8JQCkekzMQUgCLcBGAsYHQ/s728/tscopy%2B%25281%2529.png

Tscopy : Tool to parse the NTFS $MFT file to locate...

Tscopy is a requirement during an Incident Response (IR) engagement to have the ability to analyze files on the filesystem. Sometimes these...
Subscraper

Subscraper – Tool That Performs Subdomain Enumeration Through Various Techniques

SubScraper uses DNS brute force, Google & Bing scraping, and Virus Total to enumerate subdomains without an API. Written in Python3, SubScraper performs HTTP(S)...