Saturday, July 20, 2019
Home Tags Information gathering

Tag: information gathering

Must Need

Reload.sh

Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without...

Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running...
RDPScan : A Quick Scanner For “BlueKeep”  Vulnerability

RDPScan : A Quick Scanner For “BlueKeep” Vulnerability

RDPScan is a quick-and-dirty scanner for the CVE-2019-0708 vulnerability in Microsoft Remote Desktop. Right now, there are about 900,000 machines on the...
Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;
Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
Nameles

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid...

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout