Sr2T - Converts Scanning Reports To A Tabular Format
Reviewed by Zion3R
on
8:30 AM
Rating:
DNS-Tunnel-Keylogger - Keylogging Server And Client That Uses DNS Tunneling/Exfiltration To Transmit Keystrokes
Reviewed by Zion3R
on
8:30 AM
Rating: 5
MultiDump - Post-Exploitation Tool For Dumping And Extracting LSASS Memory Discreetly
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
Gtfocli - GTFO Command Line Interface For Easy Binaries Search Commands That Can Be Used To Bypass Local Security Restrictions In Misconfigured Systems
Reviewed by Zion3R
on
8:38 PM
Rating: 5
WinFiHack - A Windows Wifi Brute Forcing Utility Which Is An Extremely Old Method But Still Works Without The Requirement Of External Dependencies
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Advertisement
RKS - A Script To Automate Keystrokes Through A Graphical Desktop Program
Reviewed by Zion3R
on
8:30 AM
Rating: 5
PurpleKeep - Providing Azure Pipelines To Create An Infrastructure And Run Atomic Tests
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Pantheon - Insecure Camera Parser
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Blutter - Flutter Mobile Application Reverse Engineering Tool
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Linpmem - A Physical Memory Acquisition Tool For Linux
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Nim-Shell - Reverse Shell That Can Bypass Windows Defender Detection
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Douglas-042 - Powershell Script To Help Speed Up Threat Hunting Incident Response Processes
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Py-Amsi - Scan Strings Or Files For Malware Using The Windows Antimalware Scan Interface
Reviewed by Zion3R
on
8:30 AM
Rating: 5
NimExec - Fileless Command Execution For Lateral Movement In Nim
Reviewed by Zion3R
on
8:30 AM
Rating: 5
HiddenDesktop - HVNC For Cobalt Strike
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Red Canary Mac Monitor - An Advanced, Stand-Alone System Monitoring Tool Tailor-Made For macOS Security Research
Reviewed by Zion3R
on
8:30 AM
Rating: 5
S4UTomato - Escalate Service Account To LocalSystem Via Kerberos
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Dissect - Digital Forensics, Incident Response Framework And Toolset That Allows You To Quickly Access And Analyse Forensic Artefacts From Various Disk And File Formats
Reviewed by Zion3R
on
8:30 AM
Rating: 5
EDRaser - Tool For Remotely Deleting Access Logs, Windows Event Logs, Databases, And Other Files
Reviewed by Zion3R
on
8:30 AM
Rating: 5
Subscribe to:
Posts (Atom)