Monday, July 6, 2020
Home Tags Protocol attacks

Tag: protocol attacks

Must Need

HRShell

HRShell : HTTPS/HTTP Reverse Shell Built With Flask

HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe is a undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender, Malwarebytes, Avast, ESET-NOD32,...
SIPI

SIPI – Simple IP Information Tools for Reputation Data Analysis

SIPI tool is aimed for Incident Response Team and anyone what's want to know the behaviour of the "suspicious" IP Address. The tools do...
SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

SecureTea Project : OWASP Application Designed To Help Secure Unauthorised Access

The OWASP SecureTea Project is an application designed to help secure a person's laptop or computer / server with IoT (Internet Of...
Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

Spyse : Python API Wrapper & Command-Line Client For The Tools...

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption...
Traxss : Automated XSS Vulnerability Scanner

Traxss : Automated XSS Vulnerability Scanner

Traxss is an automated framework to scan URLs and webpages for XSS Vulnerabilities. It includes over 575 Payloads to test with and...
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...