Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   pak-tani   /   Page 2
BrowserBackdoor v1.15 is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.

BrowserBackdoor v1.15 is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener.

June 11, 2016
pak-tani
Browser, Penetration Test

BrowserBackdoor is an Electron application that uses a JavaScript WebSocket Backdoor to connect to the listener. BrowserBackdoorServer is a WebSocket server that listens for incoming…

Read Article →
Updates Winpayloads - Undetectable Windows Payload Generation.

Updates Winpayloads – Undetectable Windows Payload Generation.

February 16, 2016
pak-tani
Exploits, Networking

changelog 16/2/2016: + setup.sh : Forcing and installing python2.7 + winpayloads.py : Fixed bug with custom port and uac. Winpayloads is a Undetectable Windows Payload…

Read Article →
SQLinject.sh - Script to automate the process of hijacking an MSSQL database connection.

SQLinject.sh – Script to automate the process of hijacking an MSSQL database connection.

February 12, 2016
pak-tani
Code Scripting, Networking, Penetration Test, Sql Injection

This script is designed to automate the process of hijacking an MSSQL database connection. This script can be used to perform a MITM attack between…

Read Article →
BetterCap v1.3.3 - A complete, modular, portable and easily extensible MITM framework.

BetterCap v1.3.3 – A complete, modular, portable and easily extensible MITM framework.

January 31, 2016
pak-tani
Framework, Networking, Penetration Test

Changelog v1.3.3: New Features: + New DICT protocol credentials parser. + New Redis protocol credentials parser. + New MPD protocol credentials parser. + New RLogin…

Read Article →
Easy File Sharing Metasploit Buffer Overflow.

Easy File Sharing Metasploit Buffer Overflow.

December 29, 2015
pak-tani
Code Scripting, Exploits, Networking

These modules exploit the Easy File Sharing 7.2 Windows program(Download) The exploits lie in the GET and HEAD requests, allowing external code to overwrite the…

Read Article →
PowerSploit v3.0.0 released - A PowerShell Post-Exploitation Framework.

PowerSploit v3.0.0 released – A PowerShell Post-Exploitation Framework.

December 19, 2015
pak-tani
Exploits, Framework, Networking, Penetration Test

Changelog v3.0.0: Features added: + PowerView and PowerUp!!! Moving forward this will be the home of these projects. Thank you @harmj0y for all the work…

Read Article →
BAdAdmin v0.2 released : Python application that makes a device vulnerable for attack and defense practice.

BAdAdmin v0.2 released : Python application that makes a device vulnerable for attack and defense practice.

November 26, 2015
pak-tani
Networking, Penetration Test

BadAdmin is an application that is built to make a computer or virtual machine vulnerable to attacks for computer security practice. It uses numerous modules…

Read Article →
NotSoSerial is a Java Agent designed as a mitigation effort against deserialization attacks.

NotSoSerial is a Java Agent designed as a mitigation effort against deserialization attacks.

November 12, 2015
pak-tani
Penetration Test

NotSoSerial is a Java Agent designed as a mitigation effort against deserialization attacks. Think of it as a “deserialization firewall”. It gives you complete control…

Read Article →
← Previous 1 2 3 … 7 Next →

Copyright © 2018

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools