Wednesday, August 12, 2020
Home Tags Leviathan

Tag: Leviathan

Must Need

PingCastle : Get Active Directory Security At 80% In 20% Of The Time

PingCastle : Get Active Directory Security At 80% In 20% Of...

PingCastle is a tool designed to assess quickly the Active Directory security level with a methodology based on risk assessment and a...
Pytm : A Pythonic Framework For Threat Modeling

Pytm : A Pythonic Framework For Threat Modeling

Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm can...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...
JCS

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database...
MSNM Sensor – Multivariate Statistical Network Monitoring Sensor

MSNM Sensor – Multivariate Statistical Network Monitoring Sensor

MSNM Sensor (Multivariate Statistical Network Monitoring-Sensor) shows the practical suitability of the approaches found in PCA-MSNM and in Hierarchical PCA-MSNM works....
CuckooDroid

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox

CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of...
Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material...