Wednesday, June 16, 2021
Home Tags HID Attacks

Tag: HID Attacks

Must Need

PYWhatCMS

PYWhatCMS – Unofficial WhatCMS API Package

PyWhatCMS is a python package for whatcms.com API. This package provides a simple way to use the whatcms.org API for detecting 467...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
Hayat

Hayat – Google Cloud Platform & Auditing & Hardening Script

Hayat tool used for Google Cloud Platform Auditing & Hardening Script. What does that mean Hayat? Well, I had a hard time finding a unique name,...
Using Bulk Scripting With Remote.it

Using Bulk Scripting With remote.it

If you’re managing a fleet of devices (endpoints), you run into the challenge of managing and updating those devices without exposing your...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...
ScareCrow : Payload Creation Framework Designed Around EDR Bypass

ScareCrow : Payload Creation Framework Designed Around EDR Bypass

ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process...
How to Make More Money as a Cyber Security Expert – Everything You Need to Know

How to Make More Money as a Cyber Security Expert –...

You have chosen a niche of immense capacity. The market size of cybersecurity is expected to swell from 137.6 Billion USD dollars...