Monday, August 20, 2018
Home Tags Log management

Tag: log management

Must Need

Pemcracker

Pemcracker – Tool to crack encrypted PEM files

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to...

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us...
Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...
ReelPhish

ReelPhish – A Real-Time Two-Factor Phishing Tool

ReelPhish is a real-time two-factor phishing tool. This ReelPhish tool has been released along with a FireEye blog post. The blog post can be...

Penetration Testing Resources For Simulated Attacks

Penetration testing, all the more usually called pentesting, is the act of discovering openings that could be abused in an application, system or framework...