Tuesday, June 15, 2021
Home Tags IPtables

Tag: IPtables

Must Need

Pesidious : Malware Mutation using Deep Reinforcement Learning & GANs

Pesidious : Malware Mutation using Deep Reinforcement Learning & GANs

The purpose of the tool is to use artificial intelligence to mutate a malware (PE32 only) sample to bypass AI powered classifiers...
Apache Struts

Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities...

Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE on...
CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
Mole : A Framework For Identifying & Exploiting Out-Of-Band Application Vulnerabilities

Mole : A Framework For Identifying & Exploiting Out-Of-Band Application Vulnerabilities

Mole is a framework for identifying and exploiting out-of-band (OOB) vulnerabilities. Installation & Setup
TLS-Scanner

TLS-Scanner : The TLS-Scanner Module from TLS-Attacker

TLS-Scanner is a tool created by the Chair for Network and Data Security from the Ruhr-University Bochum to assist pentesters and security researchers in...
Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks

Lucifer : A Powerful Penetration Tool For Automating Penetration Tasks

Lucifer is a Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More… Use Or Build...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management...

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main...