Monday, December 16, 2019
Home Tags WPA

Tag: WPA

Must Need

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java-scripts & shell-codes. It...
Trivy :  Simple & Comprehensive Vulnerability Scanner

Trivy : Simple & Comprehensive Vulnerability Scanner

Trivy is a Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. A software vulnerability is a glitch, flaw,...

BlobRunner – Quickly Debug Shellcode Extracted During Malware Analysis

BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and jumps to the base...
Telegram BBBot :  Telegram Bug Bounty Bot

Telegram BBBot : Telegram Bug Bounty Bot

Telegram BBBot is a Telegram Bug Bounty Bot. History Telegram BBBot This bot adopted...
Prevent Hacking

How To Prevent Hacking in 2020

Hacking is a term that refers to an unauthorized intrusion into a computer network or system. Hackers may alter a computer system...
GoDoH : A DNS-Over-HTTPS C2

GoDoH : A DNS-Over-HTTPS C2

GoDoH is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently supported...