Thursday, September 19, 2019
Home Tags Metasploit

Tag: metasploit

Must Need

Volatility Framework

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized...
Http Request Smuggler : Extension For Burp Suite

Http Request Smuggler : Extension For Burp Suite

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggler attacks, originally created during HTTP Desync Attacks research.
PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable

PEpper : An Open Source Script To Perform Malware Static Analysis...

PEpper is an open source tool to perform malware static analysis on Portable Executable. Following are some of the features supported by the tool;
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
Fibratus

Fibratus : Tool for Exploration & Tracing of the Windows Kernel

Fibratus is a tool which is able to capture the most of the Windows kernel activity - process/thread creation and termination, context switches,...
Git Hound – Find Exposed Keys Across GitHub Using Code Search Keywords

Git Hound – Find Exposed Keys Across GitHub Using Code Search...

Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout