Saturday, September 21, 2019
Home Tags Penetration

Tag: Penetration

Must Need

CIRTKit

CIRTKit : Tools for the Computer Incident Response Team

CIRTKit is a tools for the computer incident response team. One DFIR console to rule them all. Built on top of the...
ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

ReverseTCPShell is a tool for Reverse Encrypted (AES 256-bit) Shell over TCP using PowerShell SecureString. Attacker (C2-Server Listener):
Volatility Framework

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized...
Usbrip : Simple CLI Forensics Tool For Tracking USB Device Artifacts

Usbrip : Simple CLI Forensics Tool For Tracking USB Device Artifacts

Usbrip (derived from "USB Ripper", not "USB R.I.P." astonished) is an open source forensics tool with CLI interface that lets you keep...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...
Skadi : Collect, Process & Hunt With Host Based Data From MacOS, Windows & Linux

Skadi : Collect, Process & Hunt With Host Based Data From...

Skadi is a free, open source collection of tools that enables the collection, processing and advanced analysis of forensic artifacts and images....
Shodanwave

Shodanwave – Tool For Exploring & Obtaining Information From Cameras

Shodanwave is a tool for exploring and obtaining information from cameras specifically Netwave IP Camera. The tool uses a search engine called shodan that...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout