Sunday, January 24, 2021
Home Tags Vulnerable Hybrid Mobile Application

Tag: Vulnerable Hybrid Mobile Application

Must Need

SysWhispers  : AV/EDR Evasion Via Direct System Calls

SysWhispers : AV/EDR Evasion Via Direct System Calls

SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported from...

KDE Applications 19.04 Release

Recently, a new version of KDE Applications was released. It includes 150+ fixes, numerous new updates and fresh options, and several dozens...
Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation Tasks

Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation...

Flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible...
Lynis

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth...

Docker Tor Hidden Service Nginx – Easily Setup A Hidden Service...

Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the skeleton configuration for you hidden...
DetectionLab : Vagrant & Packer Scripts To Build A Lab Environment

DetectionLab : Vagrant & Packer Scripts To Build A Lab Environment

DetectionLab is tested weekly on Saturdays via a scheduled CircleCI workflow to ensure that builds are passing. This lab has been designed...
Converto : Installing Kali Linux on VPS Server

Converto : Installing Kali Linux on VPS Server

Converto is a automated Kali Linux or Parrot OS installer for VPS, also installs VNC (Graphical / Non-Graphical VNC). It is tested...