Thursday, February 27, 2020
Home Tags Post exploitation

Tag: post exploitation

Must Need

Aztarna

Aztarna – A Footprinting Tool For Robots

This repository contains Alias Robotic's aztarna, a footprinting tool for robots. Alias Robotics supports original robot manufacturers assessing...
Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

Covenant : A .NET Command & Control Framework That Aims To...

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive...
Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.
ADAPT

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...
BurpSuite : Secret Finder Extension To Discover APIkeys/Tokens From HTTP Response

BurpSuite : Secret Finder Extension To Discover APIkeys/Tokens From HTTP Response

BurpSuite is a Secret Finder Burp Suite extension to discover a apikey/tokens from HTTP response.
Dr_Robot : Tool Used To Enumerate The Subdomains Associated With A Company

Dr_Robot : Tool Used To Enumerate The Subdomains Associated With A...

Dr_Robot is a tool for Domain Reconnaissance and Enumeration. By utilizing containers to reduce the overhead of dealing with dependencies, inconsistency across operating...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...