Saturday, March 6, 2021
Home Tags Scanning

Tag: scanning

Must Need

RPI Hunter

RPI-Hunter : Automate Discovering & Dropping Payloads on LAN Raspberry

rpi hunter is useful when there are multiple Raspberry Pi's on your LAN with default or known credentials, in order to automate...
DroneSploit – Drone Pentesting Framework Console

DroneSploit : Drone Pentesting Framework Console

DroneSploit CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking....
PCILeech

PCILeech – Direct Memory Access (DMA) Attack Software

PCILeech uses PCIe hardware devices to read and write from the target system memory. This is achieved by using DMA over PCIe. No drivers...
Get Team Pass : Get Teamviewer’s ID & Password From A Remote Computer In The LAN

Get Team Pass : Get Teamviewer’s ID & Password From A...

Get Team Pass is a tool with which you can get teamviewer's ID and password from a remote computer in the LAN.Most...
LdapDomainDump : Active Directory Information Dumper via LDAP

LdapDomainDump : Active Directory Information Dumper via LDAP

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved...
RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for all your...
Serverless-Prey : Serverless Functions For Establishing Reverse Shells

Serverless-Prey : Serverless Functions For Establishing Reverse Shells

Serverless-Prey is a collection of serverless functions (FaaS), that, once launched to a cloud environment and invoked, establish a TCP reverse shell,...