Charlotte - C++ Fully Undetected Shellcode Launcher
Reviewed by Zion3R
on
5:30 PM
Rating:
IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Msldap - LDAP Library For Auditing MS AD
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture
Reviewed by Zion3R
on
8:30 AM
Rating: 5
CIMplant - C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems
Reviewed by Zion3R
on
5:30 PM
Rating: 5
R77-Rootkit - Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc...
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
ByeIntegrity-UAC - Bypass UAC By Hijacking A DLL Located In The Native Image Cache
Reviewed by Zion3R
on
5:30 PM
Rating: 5
CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Judge-Jury-and-Executable - A File System Forensics Analysis Scanner And Threat Hunting Tool
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Priv2Admin - Exploitation Paths Allowing You To (Mis)Use The Windows Privileges To Elevate Your Rights Within The OS
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Evasor - A Tool To Be Used In Post Exploitation Phase For Blue And Red Teams To Bypass APPLICATIONCONTROL Policies
Reviewed by Zion3R
on
5:30 PM
Rating: 5
MeterPwrShell - Automated Tool That Generate The Perfect Powershell Payload
Reviewed by Zion3R
on
5:30 PM
Rating: 5
PwnLnX - An Advanced Multi-Threaded, Multi-Client Python Reverse Shell For Hacking Linux Systems
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Invoke-Stealth - Simple And Powerful PowerShell Script Obfuscator
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Posta - Cross-document Messaging Security Research Tool
Reviewed by Zion3R
on
8:30 AM
Rating: 5
BetterXencrypt - A Better Version Of Xencrypt - Xencrypt It Self Is A Powershell Runtime Crypter Designed To Evade AVs
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Cypheroth - Automated, Extensible Toolset That Runs Cypher Queries Against Bloodhound's Neo4j Backend And Saves Output To Spreadsheets
Reviewed by Zion3R
on
8:30 AM
Rating: 5
HttpDoom - A Tool For Response-Based Inspection Of Websites Across A Large Amount Of Hosts For Quickly Gaining An Overview Of HTTP-based Attack Surface
Reviewed by Zion3R
on
8:30 AM
Rating: 5
IRTriage - Incident Response Triage - Windows Evidence Collection For Forensic Analysis
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Defeat-Defender - Powerful Batch Script To Dismantle Complete Windows Defender Protection And Even Bypass Tamper Protection
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Subscribe to:
Posts (Atom)