Wednesday, October 21, 2020
Home Tags Ransomware

Tag: Ransomware

Must Need

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation...

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote...
Pompem

Pompem : Tool For Exploits & Vulnerability in Database

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases....
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...
AutoPwn : Automate Repetitive Tasks For Fuzzing

AutoPwn : Automate Repetitive Tasks For Fuzzing

Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from stdin for starters. Attempting...
How to Send a Fax Without a Phone Line? With Fax Online Service

How to Send a Fax Without a Phone Line? With Fax...

Most people today are unaware of what a fax is, leave alone how to operate a fax machine. Although it may seem...
Audix : A PowerShell Tool To Quickly Configure Windows Event

Audix : A PowerShell Tool To Quickly Configure Windows Event

Audix is a PowerShell tool to quickly configure the Windows Event Audit Policies for security monitoring. Note: This...
CRLFMap – A Tool To Find HTTP Splitting Vulnerabilities

CRLFMap – A Tool To Find HTTP Splitting Vulnerabilities

CRLFMap is a tool to find HTTP Splitting vulnerabilities. Why? I wanted to write...