Wednesday, January 20, 2021
Home Tags Post exploitation

Tag: post exploitation

Must Need

Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us...
CyberRange : The Open-Source AWS Cyber Range

CyberRange : The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete...
Adama : Searches For Threat Hunting & Security Analytics

Adama : Searches For Threat Hunting & Security Analytics

Adama is a tool for searches for threat hunting and security analytics. A collection of known log and / or event...
EternalBlueC : Tool For EternalBlue Vulnerability Detector, DoublePulsar Detector & DoublePulsar Shellcode & DLL Uploader

EternalBlueC : Tool For EternalBlue Vulnerability Detector, DoublePulsar Detector & DoublePulsar...

EternalBlueC suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector and DoublePulsar UploadDLL & Shellcode
Dnssearch : A Subdomain Enumeration Tool

Dnssearch : A Subdomain Enumeration Tool

Dnssearch is a subdomain enumeration tool. It takes an input domain ( -domain parameter ) and a wordlist ( -wordlist parameter ), it will then perform...
Bosque

Microsoft Bosque Programming Language

The Bosque programming language is a Microsoft Research project that is investigating language designs for writing code that is simple, obvious, and easy to...
Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation Environment With Docker Containers

Dockernymous : A Script Used To Create A Whonix Like Gateway/Workstation...

Dockernymous is a script used to create a whonix like gateway/workstation environment with docker containers. It is a start script for Docker...