Friday, July 23, 2021
Home Tags UAC-Bypassing

Tag: UAC-Bypassing

Must Need

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in the post...
ABPTTS : TCP Tunneling Over HTTP/HTTPS For Web Application Servers

ABPTTS : TCP Tunneling Over HTTP/HTTPS For Web Application Servers

ABPTTS uses a Python client script and a web application server page/package to tunnel TCP traffic over an HTTP/HTTPS connection to a...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...
Cuteit

Cuteit – IP Obfuscator Made to Make a Malicious IP a...

Cuteit IP obfuscator made to make a malicious ip a bit cuter. A simple python tool to help...
BlueCloud : Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D

BlueCloud : Cyber Range including Velociraptor + HELK system with a...

BlueCloud , a Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with...
TeaBreak : A Productivity Burp Extension

TeaBreak : A Productivity Burp Extension

TeaBreak is a simple burp extension for security researchers and bug bounty hunters for helping them to increase their work productivity. We...
Ducky Exploit

Ducky Exploit – Arduino Rubber Ducky Framework

Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on ; Kali Linux 18.2 ...