Wednesday, April 1, 2020
Home Tags Sticky Keys Hack

Tag: Sticky Keys Hack

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
Cloud Security Audit : A Command Line Security Audit Tool For Amazon Web Services

Cloud Security Audit : A Command Line Security Audit Tool For...

Cloud Security Audit is a command line tool that scans for vulnerabilities in your AWS Account. In easy way you will be...
Volatility Framework

Volatility Framework – Volatile memory extraction utility framework

The Volatility Framework is a totally open accumulation of tools, executed in Python under the GNU General Public License, for the extraction of computerized...
CredsLeaker

CredsLeaker : Display a Powershell Credentials Box

CredsLeaker script is used to display a powershell credentials box asked the user for credentials.
Vboxdie Cracker

Vboxdie Cracker – Virtual Box Disk Image Encryption Password Cracker

Vboxdie Cracker is a virtual box disk image encryption password cracker. User password is stored using a combination of PBKDF2 and AES-XTS, but they...
ISPY : Eternalblue/Bluekeep Scanner & Exploit

ISPY : Eternalblue/Bluekeep Scanner & Exploit

ISPY V1.0 is a eternalblue(ms17-010)/bluekeep(CVE-2019-0708) scanner and exploit ( Metasploit automation ) . How to install?
SSRFmap

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes...