Thursday, June 4, 2020
Home Tags UAC-Bypassing

Tag: UAC-Bypassing

Must Need

AhMyth

AhMyth Android Rat – Remote Administration Tool

AhMyth Android RAT is an Android Remote Administration Tool. It consists of two parts : Server side : Desktop application based on electron framework...
nDPI

nDPI : Open Source Deep Packet Inspection Software Toolkit

nDPI is an open source LGPLv3 library for deep-packet inspection. Based on OpenDPI it includes ntop extensions. We have tried to...
Graffiti : A Tool To Generate Obfuscated One Liners To Aid In Penetration Testing

Graffiti : A Tool To Generate Obfuscated One Liners To Aid...

Graffiti is a tool to generate obfuscated oneliners to aid in penetration testing situations. Graffiti accepts the following languages for encoding:
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt

IoTGoat : A Deliberately Insecure Firmware Based On OpenWrt

The IoTGoat Project is a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most...
Angr

Angr : A Powerful & User-Friendly Binary Analysis Platform

Angr is a platform-agnostic binary analysis framework. It is a suite of Python 3 libraries that let you load a binary and...
Jeopardize : A Low Cost Threat Intelligence&Response Tool

Jeopardize : A Low Cost Threat Intelligence&Response Tool

Jeopardize is a low(zero) cost threat intelligence&response tool against phishing domains. Jeopardize tool is developed to provide basic threat...