Tuesday, July 27, 2021
Home Tags Nemesis

Tag: Nemesis

Must Need

LKWA : Lesser Known Web Attack Lab

LKWA : Lesser Known Web Attack Lab

LKWA or Lesser Known Web Attack Lab is for intermediate pentester that can test and practice lesser known web attacks...
DNS-Black-Cat(DBC) : Multi Platform Toolkit For An Interactive DNS Shell Commands Exfiltration, By Using DNS-Cat You Will Be Able To Execute System Commands In Shell Mode Over DNS Protocol

DNS-Black-Cat(DBC) : Multi Platform Toolkit For An Interactive DNS Shell Commands...

DNS-Black-Cat is a Multi-platform toolkit for an interactive C2C DNS shell, by using DNS-Black-Cat, you will be able to execute system commands...
AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike Beacon

AzureC2Relay : An Azure Function That Validates And Relays Cobalt Strike...

AzureC2Relay is an Azure Function that validates and relays Cobalt Strike beacon traffic by verifying the incoming requests based on a Cobalt...
Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force

Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force

Lazy-RDP is a Script for automatic scanning of the address list for the presence of open 3389 ports, and then selecting the...
Prevent Hacking

How To Prevent Hacking in 2020

Hacking is a term that refers to an unauthorized intrusion into a computer network or system. Hackers may alter a computer system...
Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial & Customized Assessment

Phishing Simulation : Increase Phishing Awareness By Providing An Intuitive Tutorial...

Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment (without any actual setup - no...
OverRide : Binary Exploitation And Reverse-Engineering

OverRide : Binary Exploitation And Reverse-Engineering

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level...