Friday, July 23, 2021
Home Tags Ninja C2

Tag: Ninja C2

Must Need

BeeBug

BeeBug : A tool for checking Exploitability

BeeBug is a tool that can be used to verify if a program crash could be exploitable. This tool was presented the...
RFI/LFI : Local/Remote File Inclusion

RFI/LFI : Local/Remote File Inclusion

Let us take a look at the RFI/LFI payload list. As with many exploits, remote and local file inclusions are only a...
Understanding the Desktop as a Service Model

Understanding the Desktop as a Service Model

You may have heard of software as a service before, which some people abbreviate as SaaS. Not as many people know about...
Onex : A Library Of Hacking Tools For Termux And Other Linux Distributions

Onex : A Library Of Hacking Tools For Termux And Other...

Onex is a kali linux hacking tools installer for termux and other linux distribution. It's package manager for hacker's. It can manage...
Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection

Defeat-Defender : Powerful Batch Script To Dismantle Complete Windows Defender Protection

Defeat-Defender is a powerfull batch file to disable windows defender,firewall,smartscreen and execute the payload. Usage
Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
AngrgDB : Use Angr Inside GDB

AngrgDB : Use Angr Inside GDB

AngrgDB use angr inside GDB. Create an angr state from the current debugger state. Install