Sunday, February 23, 2020
Home Tags Windows

Tag: windows

Must Need

DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
HRShell

HRShell : HTTPS/HTTP Reverse Shell Built With Flask

HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
SSHD Poison : A Tool To Get Creds Of Pam Based SSHD Authentication

SSHD Poison : A Tool To Get Creds Of Pam Based...

SSHD Poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that...
HashCracker : Python Hash Cracker

HashCracker : Python Hash Cracker

HashCracker is a python hash cracker which support hashing algorithms like SHA512, SHA256, SHA384, SHA1, MD5, SHA224.
LinPwn : Interactive Post Exploitation Tool

LinPwn : Interactive Post Exploitation Tool

LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation. Connection
OWASP Joomla Vulnerability Scanner

Joomscan – OWASP Joomla Vulnerability Scanner Project

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability...
Mr SIP

Mr SIP : SIP-Based Audit and Attack Tool

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help...