FalconEye - Real-time detection software for Windows process injections
Reviewed by Zion3R
on
5:30 PM
Rating:
Rustcat - Netcat Alternative
Reviewed by Zion3R
on
8:30 AM
Rating: 5
PPLdump - Dump The Memory Of A PPL With A Userland Exploit
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Advertisement
TChopper - Conduct Lateral Movement Attack By Leveraging Unfiltered Services Display Name To Smuggle Binaries As Chunks Into The Target Machine
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Nebula - Cloud C2 Framework, Which At The Moment Offers Reconnaissance, Enumeration, Exploitation, Post Exploitation On AWS
Reviewed by Zion3R
on
5:30 PM
Rating: 5
BlueCloud - Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
ColdFire - Golang Malware Development Library
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Link - A Command And Control Framework Written In Rust
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Shepard - In Progress Persistent Download/Upload/Execution Tool Using Windows BITS
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Onelinepy - Python Obfuscator To Generate One-Liners And FUD Payloads
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Dent - A Framework For Creating COM-based Bypasses Utilizing Vulnerabilities In Microsoft's WDAPT Sensors
Reviewed by Zion3R
on
6:18 PM
Rating: 5
HookDump - Security Product Hook Detection
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Qvm-Create-Windows-Qube - Spin Up New Windows Qubes Quickly, Effortlessly And Securely
Reviewed by Zion3R
on
8:30 AM
Rating: 5
CiLocks - Android LockScreen Bypass
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Charlotte - C++ Fully Undetected Shellcode Launcher
Reviewed by Zion3R
on
5:30 PM
Rating: 5
IPED - Digital Forensic Tool - Process And Analyze Digital Evidence, Often Seized At Crime Scenes By Law Enforcement Or In A Corporate Investigation By Private Examiners
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Msldap - LDAP Library For Auditing MS AD
Reviewed by Zion3R
on
5:30 PM
Rating: 5
Mediator - An Extensible, End-To-End Encrypted Reverse Shell With A Novel Approach To Its Architecture
Reviewed by Zion3R
on
8:30 AM
Rating: 5
CIMplant - C# Port Of WMImplant Which Uses Either CIM Or WMI To Query Remote Systems
Reviewed by Zion3R
on
5:30 PM
Rating: 5
R77-Rootkit - Fileless Ring 3 Rootkit With Installer And Persistence That Hides Processes, Files, Network Connections, Etc...
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Subscribe to:
Posts (Atom)