Wednesday, July 28, 2021
Home Tags Networks

Tag: Networks

Must Need

W12Scan

W12Scan : A Simple Asset Discovery Engine for Cybersecurity

W12Scan is a network asset discovery engine that can automatically aggregates related assets for analysis and use. W12scan is also my...
StegCloak : Hide Secrets With Invisible Characters In Plain Text Securely Using Passwords

StegCloak : Hide Secrets With Invisible Characters In Plain Text Securely...

StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside text by compressing and encrypting the...
EvilApp : Phishing Attack Using An Android Application

EvilApp : Phishing Attack Using An Android Application

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication...
RedGhost :  Linux Post Exploitation Framework Designed To Assist Red Teams In Gaining Persistence, Reconnaissance & Leaving No Trace

RedGhost : Linux Post Exploitation Framework Designed To Assist Red...

RedGhost is a Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.

More Core Changes in Kali Sana (V 2.0)

More Linux Core Changes in Kali Sana to be noticed.(Also applies to Other Latest Linux Distros) Recently, some core changes & tweaks were introduced to...
Ddos2track

Ddos2track – Script To Avoid HTTP Floods Attacks

With Ddos2track tool you can block HTTP Flood Attacks and break down them with a honeypot. THE TOOL SEND YOU AN ADVERTISING EMAIL AFTER DETECT A...
CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via SMB

CredNinja – A Multithreaded Tool Designed To Identify If Credentials Via...

CredNinja is a multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale...