Thursday, February 27, 2020
Home Tags Maintain

Tag: maintain

Must Need

Mutiny Fuzzer

Mutiny Fuzzer : Network Fuzzer Replaying PCAPs Through a Mutational Fuzzer

The Mutiny Fuzzer Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to...
Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
Caldera : An Automated Adversary Emulation System

Caldera : An Automated Adversary Emulation System

CALDERA is an automated adversary emulation system, built on the MITRE ATT&CK™ framework. It works by attaching abilities to an adversary and running...
PyCPU

PyCPU – Central Processing Unit Information Gathering Tool

PyCPU tool you can access detailed information of your processor information. You can also check the security vulnerability based on the current processor information...
Cloudmapper

Cloudmapper – Tool Helps To Analyze Your AWS Environments

CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser....
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...