Wednesday, November 13, 2019
Home Tags ShellPhish

Tag: ShellPhish

Must Need

FOCA : Tool To Find Metadata & Hidden Information In The Documents

FOCA : Tool To Find Metadata & Hidden Information In The...

FOCA is a tool used mainly to find metadata and hidden information in the documents it scans. These documents may be on...
Ridrelay

RidRelay – Easy Way To Get Domain Usernames While On An...

Quick and easy way to get domain usernames while on an internal network. RidRelay combines the SMB Relay attack, common lsarpc based queries and...
Evillimiter

Evillimiter : Tool that Limits Bandwidth of Devices on the Same...

Evillimiter is a tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access.
SQLMap v1.2.9

SQLMap v1.2.9 – Automatic SQL Injection & Database Takeover Tool

SQLMap v1.2.9 is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database...
Act Platform : Open Platform For Collection & Exchange Of Threat Intelligence Information

Act Platform : Open Platform For Collection & Exchange Of Threat...

Semi-Automated Cyber Threat Intelligence or ACT is a research project led by mnemonic as with contributions from the University of Oslo, NTNU,...
XXRF Shots

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class where attacker sends crafted...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...