Friday, July 23, 2021
Home Tags Network Mapping

Tag: Network Mapping

Must Need

Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Tishna : Automated Web Application Hacker 2020

Tishna : Automated Web Application Hacker 2020

Tishna is an complete Automated pentest framework for Servers, Application Layer to Web Security. This software have 62 Options with full...
Elemental : An ATT&CK Threat Library

Elemental : An ATT&CK Threat Library

Elemental is a centralized threat library of MITRE ATT&CK techniques, Atomic Red Team tests, and over 280 Sigma rules. It provides an...
Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material...
Vuls

Vuls : Vulnerability Scanner for Linux/FreeBSD, Agentless, Written in Go

Vuls is a vulnerability scanner for Linux/FreeBSD, agentless, written in golang.
Malware

What are the Types of Malware Infecting Your Computer

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without the user's permission. Software...
RATel : An Open Source Penetration Test Tool

RATel : An Open Source Penetration Test Tool

RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the...