Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Ken-Pachi   /   Page 3
one_gadget ~ A tool for you easy to find the one gadget RCE in libc.so.6.

one_gadget ~ A tool for you easy to find the one gadget RCE in libc.so.6.

November 6, 2017
Ken-Pachi
Security Tools

One-gadget is an useful gadget in glibc, which leads to call execve(‘/bin/sh’, NULL, NULL). It’s convenient to use it to get RCE (remote code execution)…

Read Article →
kernelpop - kernel privilege escalation enumeration and exploitation framework.

kernelpop – kernel privilege escalation enumeration and exploitation framework.

October 29, 2017
Ken-Pachi
Exploits, Framework

kernelpop is a framework for performing automated kernel privilege escalation exploit enumeration on Linux, Mac-OSX, and Windows hosts. The default mode runs with the command…

Read Article →
krackdetector - Detect and prevent KRACK attacks in your network.

krackdetector – Detect and prevent KRACK attacks in your network.

October 19, 2017
Ken-Pachi
Code Scripting, Security Tools, Wireless/wifi

KRACK Detector is a Python script to detect possible KRACK attacks (https://www.krackattacks.com/) against client devices on your network. The script is meant to be run…

Read Article →
CSharpTools - Collection of CSharp Assembly for Offensive Purposes.

CSharpTools – Collection of CSharp Assembly for Offensive Purposes.

October 12, 2017
Ken-Pachi
Code Scripting, Penetration Test

Random-CSharpTools is an Collection of CSharp Assembly for Offensive Purposes. Program lists: – CyDuck – Cylance Memory Exploitation Defense and Script Control Bypass POC. (Working…

Read Article →
PiFinger - Searches for wifi-pineapple traces and calculate wireless network security.

PiFinger – Searches for wifi-pineapple traces and calculate wireless network security.

October 3, 2017
Ken-Pachi
Security Tools, Wireless/wifi

PiFinger is to determine whether the network we are connected for is opened by Wifi- Pineapple. In addition, the tool analyzes the wireless networks you…

Read Article →
theharvester v2.7.1 - email, subdomain and people names harvester.

theharvester v2.7.1 – email, subdomain and people names harvester.

September 23, 2017
Ken-Pachi
Code Scripting, Penetration Test

Changelog in theHarvester v2.7.1: – Added Virustotal, Netcraft, Crt.sh engines – Bug Fixes theHarvester is a tool for gathering e-mail accounts, subdomain names, virtual hosts,…

Read Article →
DefenseMatrix - Full security solution for Linux Servers.

DefenseMatrix – Full security solution for Linux Servers.

September 16, 2017
Ken-Pachi
Firewall, Networking, Security Tools

DefenseMatrix helps Linux users secure their servers on various of dimentions automatically. It makes securing a Linux server faster and easier. It includes: + iptables…

Read Article →
brutedet - Simple bruteforce detection tool.

brutedet – Simple bruteforce detection tool.

September 9, 2017
Ken-Pachi
Brute Force, Firewall, Security Tools

Synopsis On this page you’ll find a simple, drop-in bruteforce detection program. brutedet it’s a very lightweight implementation in portable C and it doesn’t require…

Read Article →
← Previous 1 2 3 4 … 19 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools