Friday, November 22, 2019
Home Tags WPBullet

Tag: WPBullet

Must Need

Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Simplify : Generic Android Deobfuscator

Simplify : Generic Android Deobfuscator

Simplify virtually executes an app to understand its behaviour and then tries to optimise the code so that it behaves identically but...
Manati : A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts

Manati : A Web-Based Tool To Assist The Work Of The...

The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery...
A List Of Services & How To Claim Subdomain With Dangling DNS Records

A List Of Services & How To Claim Subdomain With Dangling...

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed...
Trivy :  Simple & Comprehensive Vulnerability Scanner

Trivy : Simple & Comprehensive Vulnerability Scanner

Trivy is a Simple and Comprehensive Vulnerability Scanner for Containers, Suitable for CI. A software vulnerability is a glitch, flaw,...
UniFuzzer : A Fuzzing Tool For Closed-Source Binaries Based On Unicorn & LibFuzzer

UniFuzzer : A Fuzzing Tool For Closed-Source Binaries Based On Unicorn...

UniFuzzer is a fuzzing tool for closed-source binaries based on Unicorn and LibFuzzer. Currently it supports fuzzing 32-bits LSB ELF files on ARM/MIPS, which are...