Sunday, December 15, 2019
Home Tags ThreatHunting

Tag: ThreatHunting

Must Need

HT-WPS-Breaker

HT-WPS-Breaker : High Touch WPS Breaker

High Touch HT-WPS-BREAKER is a small tool based on the bash script language, it can help you to extract the wps pin...
Droidefense

Droidefense : Advance Android Malware Analysis Framework

Droidefense is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that malware researcher have...
0d1n

0d1n : Web Security Tool to Make Fuzzing at HTTP/S

0d1n is a tool for automating customized attacks against web applications. Let us have a look on the features the Web Security...
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...
Blackbone

Blackbone – Memory Hacking Library For Windows

Blackbone is a tool used to hack windows memory library. Blackbone is licensed under the MIT License.  Features Of Blackbone Process interaction Manage PEB32/PEB64 Manage process...
hassh

Hassh : Tool Used To Identify Specific Client & Server SSH...

HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints can be easily stored,...
FIR

FIR : Fast Incident Response

FIR (Fast Incident Response) is an cybersecurity incident management platform designed with agility and speed in mind. It allows for easy...