Thursday, January 23, 2020
Home Tags Peda

Tag: Peda

Must Need

RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the clear-text credentials...
Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File...

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image. It is a...
LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN : Lets Map Your Network To Visualise Your Physical Network

LMYN or Lets Map Your Network enables you to visualise your physical network in form of graph with zero manual error. ...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...
Easysploit

Easysploit : Metasploit Automation Easier & Faster Than Ever

The laterst version of EasySploit v3.1, which makes Metasploit automation easier and faster than ever. Following are the new options...
ISeeYou

ISeeYou : Tool To Get Exact Location of The Users...

ISeeYou is a Bash and Javascript tool to find the exact location of the users during social engineering or...
Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types...

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool...