Wednesday, July 28, 2021
Home Tags Mythic

Tag: Mythic

Must Need

AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
Applications You Can Build with Free APIs

Applications You Can Build with Free APIs

With free APIs, developers can practice programming by using those APIs to create applications. Once you have practiced writing apps, you can...
CuckooDroid

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox

CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of...
Chaos

CHAOS : PoC that Allow Generate Payloads & Control Remote OS

CHAOS is a PoC that allow generate payloads and control remote operating systems. Features
LK_Scraper : An Fully Configurable LinkedIn Scrape

LK_Scraper : An Fully Configurable LinkedIn Scrape

Lk_scraper is an fully configurable LinkedIn scrape : scrape anything within LinkedIn Installation $...
GithubFind3r : Fast Command Line Repo/User/Commit Search Tool

GithubFind3r : Fast Command Line Repo/User/Commit Search Tool

GithubFind3r is a very fast command line repo/user/commit search tool. Also Read -...