Thursday, June 4, 2020
Home Tags Network Flow

Tag: Network Flow

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
RITA : Real Intelligence Threat Analytics

RITA : Real Intelligence Threat Analytics

RITA is a real intelligence threat analytics. RITA is an open source framework for network traffic analysis. The framework...
Phantom-Evasion

Phantom-Evasion : Python AV Evasion Tool Capable to Generate FUD Executable...

Phantom-Evasion is an interactive antivirus evasion tool written in python capable to generate (almost) FUD executable even with the most ...
Metasploitable3 on Windows

How to Install Metasploitable3 on Windows 10

A good home lab is indispensable for an ethical hacker to practice his/her craft without causing grief to others. A budding Pen...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
KRF : A Kernelspace Randomized Faulter

KRF : A Kernelspace Randomized Faulter

KRF is a Kernelspace Randomized Faulter. It currently supports the Linux and FreeBSD kernels. Fault injection is a software...
Flightsim

Flightsim : Utility to Generate Malicious Network Traffic & Evaluate Controls

Flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.