Monday, June 14, 2021
Home Tags Leviathan

Tag: Leviathan

Must Need

PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine

PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted...

PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It...
Http Request Smuggler : Extension For Burp Suite

Http Request Smuggler : Extension For Burp Suite

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggler attacks, originally created during HTTP Desync Attacks research.
AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon

AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike...

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt...
Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools : An Advanced Process Monitoring Toolkit For Offensive Operations

Ps-Tools is an advanced process monitoring toolkit for offensive operations. Having a good technical understanding of the systems we land on during...
Clipboardme : Grab & Inject Clipboard Content By Link

Clipboardme : Grab & Inject Clipboard Content By Link

Clipboardme is a tool used to grab and inject clipboard content by link. Browsers are implementing a new JavaScript API for asynchronous...
SecLists

SecLists : Security Tester’s Companion For Security Assessments

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in...
Corsy : CORS Misconfiguration Scanner

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known mis-configurations in CORS implementations.