Friday, November 22, 2019
Home Tags Kippo

Tag: Kippo

Kippo – SSH Honeypot

Kippo – SSH Honeypot

Must Need

WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...

Penetration Testing Resources For Simulated Attacks

Penetration testing, all the more usually called pentesting, is the act of discovering openings that could be abused in an application, system or framework...
Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
SDK-SMS-Stack

SDK-SMS-Stack : GSM Short Message Service Provided with TPC/IP Based Characteristics

SDK-SMS-Stack is a Framework to provided TPC/IP based characteristics to the GSM Short Message Service. This framework works in...
RSDL : Subdomain Scan With Ping Method

RSDL : Subdomain Scan With Ping Method

RSDL is a tool for subdomain Scan With Ping Method. FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the...
Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks

Discover : Custom Bash Scripts Used To Automate Various Penetration Testing...

Discover custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with...