Sunday, July 25, 2021
Home Tags Proxies

Tag: Proxies

Must Need

Mythic : A Collaborative, Multi-Platform, Red Teaming Framework

Mythic : A Collaborative, Multi-Platform, Red Teaming Framework

Mythic is a cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI. It's designed to provide...
Cybersecurity and the Interconnectedness of the IoT

Cybersecurity and the Interconnectedness of the IoT

The Internet of Things (IoT) has become somewhat of a buzzword. It is through the interconnectedness of our devices that we are...
Teatime : A Blockchain RPC Attack Framework

Teatime : A Blockchain RPC Attack Framework

Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a large variety...
Scrying : A Tool For Collecting RDP, Web & VNC Screenshots All In One Place

Scrying : A Tool For Collecting RDP, Web & VNC Screenshots...

Scrying is a new tool for collecting RDP, web and VNC screenshots all in one place. This tool is...
phishing

ReelPhish – A Real-Time Two-Factor Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the...
AutoRDPwn : The Shadow Attack Framework

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature...
WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot : Service To Mask Your E-Mails

WhoAmIMailBot is a service to mask your e-mails. It was inspired by Blur, where you can create an alias for your...