Saturday, July 24, 2021
Home Tags Windows Machines

Tag: Windows Machines

Must Need

SMB AutoRelay : Automation Of SMB/NTLM Relay Technique For Pentesting & Red Teaming Exercises

SMB AutoRelay : Automation Of SMB/NTLM Relay Technique For Pentesting &...

SMB AutoRelay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environments.
XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XoN : Tool To Search An Aggregated Repository Of Xposed Passwords

XposedOrNot or XoN tool is to search an aggregated repository of xposed passwords comprising of ~850 million real time passwords. Usage...
Kiterunner : Contextual Content Discovery Tool

Kiterunner : Contextual Content Discovery Tool

For the longest of times, content discovery has been focused on finding files and folders. While this approach is effective for legacy...
MoveKit : Cobalt Strike Kit For Lateral Movement

MoveKit : Cobalt Strike Kit For Lateral Movement

Movekit is an extension of built in Cobalt Strike lateral movement by leveraging the execute_assembly function with the SharpMove and SharpRDP .NET...
How to Create a Cybersecurity Incident Response Plan

How to Create a Cybersecurity Incident Response Plan

No matter how much businesses invest in employee training and tools and technology, there continue to be issues related to cybersecurity. Many...
EternalBlueC : Tool For EternalBlue Vulnerability Detector, DoublePulsar Detector & DoublePulsar Shellcode & DLL Uploader

EternalBlueC : Tool For EternalBlue Vulnerability Detector, DoublePulsar Detector & DoublePulsar...

EternalBlueC suite remade in C which includes: MS17-010 Exploit, EternalBlue/MS17-010 vulnerability detector, DoublePulsar detector and DoublePulsar UploadDLL & Shellcode
KubiScan : A Tool To Scan Kubernetes Cluster For Risky Permissions

KubiScan : A Tool To Scan Kubernetes Cluster For Risky Permissions

A tool for scanning Kubernetes cluster for risky permissions in Kubernetes's Role-based access control (RBAC) authorization model. The tool was published as...