Link - A Command And Control Framework Written In Rust
Reviewed by Zion3R
on
8:30 AM
Rating:
Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors
Reviewed by Zion3R
on
6:18 PM
Rating: 5
HookDump - Security Product Hook Detection
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Qvm-Create-Windows-Qube - Spin Up New Windows Qubes Quickly, Effortlessly And Securely
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
CiLocks - Android LockScreen Bypass
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Charlotte - C++ Fully Undetected Shellcode Launcher
Reviewed by Zion3R
on
5:30 PM
Rating: 5
IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Msldap - LDAP Library For Auditing MS AD
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture
Reviewed by Zion3R
on
8:30 AM
Rating: 5
CIMplant - C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems
Reviewed by Zion3R
on
5:30 PM
Rating: 5
R77-Rootkit - Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc...
Reviewed by Zion3R
on
8:30 AM
Rating: 5
ByeIntegrity-UAC - Bypass UAC By Hijacking A DLL Located In The Native Image Cache
Reviewed by Zion3R
on
5:30 PM
Rating: 5
CyberBattleSim - An Experimentation And Research Platform To Investigate The Interaction Of Automated Agents In An Abstract Simulated Network Environments
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Judge-Jury-and-Executable - A File System Forensics Analysis Scanner And Threat Hunting Tool
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Priv2Admin - Exploitation Paths Allowing You To (Mis)Use The Windows Privileges To Elevate Your Rights Within The OS
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Evasor - A Tool To Be Used In Post Exploitation Phase For Blue And Red Teams To Bypass APPLICATIONCONTROL Policies
Reviewed by Zion3R
on
5:30 PM
Rating: 5
MeterPwrShell - Automated Tool That Generate The Perfect Powershell Payload
Reviewed by Zion3R
on
5:30 PM
Rating: 5
PwnLnX - An Advanced Multi-Threaded, Multi-Client Python Reverse Shell For Hacking Linux Systems
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Subscribe to:
Posts (Atom)