Thursday, August 13, 2020
Home Tags Kage

Tag: Kage

Must Need

GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
FinalRecon : The Last Web Recon Tool You’ll Need

FinalRecon : The Last Web Recon Tool You’ll Need

FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can...
PRETty

PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET...
Dfirtrack

Dfirtrack : The Incident Response Tracking Application

DFIRTrack (Digital Forensics and Incident Response Tracking application) is an open source web application mainly based on Django using a PostgreSQL database backend.
NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

NekoBot is an auto exploit tool to facilitate the penetration of one or many websites (Wordpress, Joomla, Drupal, Magento, Opencart,and Etc).
Capsulecorp Pentest : Vagrant VirtualBox Environment For Conducting An Internal Network Penetration Test

Capsulecorp Pentest : Vagrant VirtualBox Environment For Conducting An Internal Network...

The Capsulecorp Pentest is a small virtual network managed by vagrant and ansible. It contains five virtual machines, including one Linux attacking...
Telewreck

Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248

Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect vulnerable versions of Telerik Web...