NTLMRawUnHide - A Python3 Script Designed To Parse Network Packet Capture Files And Extract NTLMv2 Hashes In A Crackable Format
Reviewed by Zion3R
on
8:30 AM
Rating:
PatchChecker - Web-based Check For Windows Privesc Vulnerabilities
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Eagle - Yet Another Vulnerability Scanner
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
HackBrowserData - Decrypt Passwords/Cookies/History/Bookmarks From The Browser
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Mail-Swipe - Script To Create Temporary Email Addresses And Receive Emails
Reviewed by Zion3R
on
5:30 PM
Rating: 5
MEDUZA - A More Or Less Universal SSL Unpinning Tool For iOS
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
vPrioritizer - Tool To Understand The Contextualized Risk (vPRisk) On Asset-Vulnerability Relationship Level Across The Organization
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Lockphish - The First Tool For Phishing Attacks On The Lock Screen, Designed To Grab Windows Credentials, Android PIN And iPhone Passcode
Reviewed by Zion3R
on
5:30 PM
Rating: 5
PwnedPasswordsChecker - Search (Offline) If Your Password (NTLM Or SHA1 Format) Has Been Leaked (HIBP Passwords List V5)
Reviewed by Zion3R
on
5:30 PM
Rating: 5
SharpSecDump - .Net Port Of The Remote SAM + LSA Secrets Dumping Functionality Of Impacket'S Secretsdump.Py
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Velociraptor - Endpoint Visibility and Collection Tool
Reviewed by Zion3R
on
8:30 AM
Rating: 5
SitRep - Extensible, Configurable Host Triage
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Enum4Linux - A Linux Alternative To Enum.Exe For Enumerating Data From Windows And Samba Hosts
Reviewed by Zion3R
on
5:30 PM
Rating: 5
GRAT2 - Command And Control (C2) Project For Learning Purpose
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Winshark - A Wireshark Plugin To Instrument ETW
Reviewed by Zion3R
on
5:34 PM
Rating: 5
Unimap - Scan Only Once By IP Address And Reduce Scan Times With Nmap For Large Amounts Of Data
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Croc - Easily And Securely Send Things From One Computer To Another
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Rbcd-Attack - Kerberos Resource-Based Constrained Delegation Attack From Outside Using Impacket
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Some-Tools - Install And Keep Up To Date Some Pentesting Tools
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Spyre - Simple YARA-based IOC Scanner
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Subscribe to:
Posts (Atom)