Monday, July 13, 2020
Home Tags IKy

Tag: iKy

Must Need

SOC Program

What to Look for in the Right SOC Program – A...

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesnā€™t matter how...

Burp Extensions – Burp Suite Extensions For The New Burp Suite...

Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add...
phishing

ReelPhish – A Real-Time Two-Factor Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the...
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...
ATTACKdatamap  : A Datasource Assessment On An Event Level To Show Potential Coverage

ATTACKdatamap : A Datasource Assessment On An Event Level To...

ATTACKdatamap is a datasource assessment on an event level to show potential coverage of the "MITRE ATT&CK" framework. This tool is developed...
Hidden Cry ā€“ Windows Crypter/Decrypter Generator With AES 256 Bits Key

Hidden Cry – Windows Crypter/Decrypter Generator With AES 256 Bits Key

Hidden Cry is a Windows Crypter/Decrypter Generator With AES 256 Bits Key. Features Works on...
PrivExchange : Exchange Your Privileges For Domain Admin Privs By Abusing Exchange

PrivExchange : Exchange Your Privileges For Domain Admin Privs By Abusing...

PrivExchange is a tool to Exchange your privileges for Domain Admin privs by abusing Exchange. These tools require impacket. You can install it...