Sunday, January 24, 2021
Home Tags ShellPhish

Tag: ShellPhish

Must Need

Lsassy : Extract Credentials From Lsass Remotel

Lsassy : Extract Credentials From Lsass Remotel

Lsassy is a tool used to extract credentials from lsass remotely. This library uses impacket project to remotely read necessary bytes...
Bulwark : An Organizational Asset & Vulnerability Management Tool

Bulwark : An Organizational Asset & Vulnerability Management Tool

Bulwark is an organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.
Ninja : Open Source C2 Server Created For Stealth Red Team Operations

Ninja : Open Source C2 Server Created For Stealth Red Team...

Ninja C2 is an Open source C2 server created by Purple Team to do stealthy computer and Active directory enumeration without...
Why is Cyber Crime Starts Growing? Detailed Report

Why is Cyber Crime Starts Growing? Detailed Report

In the era of modern technologies when almost all the data about us is available online, the level of cyber crime is...
Keylogger : Get Keyboard, Mouse, ScreenShot, Microphone Inputs & Send To Your Mail

Keylogger : Get Keyboard, Mouse, ScreenShot, Microphone Inputs & Send To...

Keylogger Get Keyboard,Mouse,ScreenShot,Microphone Inputs and Send to your Mail. Purpose of the project is testing the security of information systems.

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
Invoke-Antivm : Powershell Tool For VM Evasion

Invoke-Antivm : Powershell Tool For VM Evasion

Invoke-AntiVM is a set of modules to perform VM detection and fingerprinting (with exfiltration) via Powershell. Compatibility