Wednesday, November 20, 2019
Home Tags Pentesting

Tag: pentesting

Must Need

Five Benefits That Will Convince You to Integrate Your Systems

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad thing. It has...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
Java-Stager

Java-Stager : A PoC To Download, Compile & Execute A Java...

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk for me are: Load a...
AMIRA: Automated Malware Incident Response & Analysis

AMIRA: Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters, in particular The...
Karma

Karma : Find Leaked Emails with Your Passwords

Karma is a tool used for find leaked emails with your passwords. Usage this program for attacking targets without prior consent is...
Robber

Robber : Tool For Finding Executables Prone To DLL Hijacking

Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. So What Is DLL Hijacking? Windows has a search path...
Regipy : An OS Independent Python Library For Parsing Offline Registry Hives

Regipy : An OS Independent Python Library For Parsing Offline Registry...

Regipy is a python library for parsing offline registry hives. regipy has a lot of capabilities: Use as a...