Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Mr.Trojans   /   Page 10
Backdoor Framework : A little client/server framework for writing back doors.

Backdoor Framework : A little client/server framework for writing back doors.

January 26, 2015
Mr.Trojans
Exploits, Framework, Networking, Penetration Test

Definitions: + backdoor: A backdoor is deliberate functionality that bypasses official publicly-documented authorization methods for that software and is intended by the author to be…

Read Article →
Updates Windows-Exploit-Suggester v-23

Updates Windows-Exploit-Suggester v-23

January 26, 2015
Mr.Trojans
Exploits

+# Changelog -v23 2015-01-26: +# – typo in –local flag case (pontential vs potential). issue #5 closed. This tool compares a targets patch levels against…

Read Article →
Updates Windows-Exploit-Suggester v-21

Updates Windows-Exploit-Suggester v-21

January 22, 2015
Mr.Trojans
Exploits

# CHANGE LOG +# v21 2015-01-22 +# – changed display formatting to include nested/linked MS numbers. makes it +# easier to determine the dependencies +#…

Read Article →
Lisa - An Exploit Dev Swiss Army Knife.

Lisa – An Exploit Dev Swiss Army Knife.

January 21, 2015
Mr.Trojans
Exploits

Usage: Copy lisa.py and .lldbinit to ~/ Use the following commands:

1
2
3
ant4g0nist$ cp lisa.py ~/lisa.py
ant4g0nist$ cp .lldbinit ~/.lldbinit
ant4g0nist$ lldb

(When a process crashes while debugging, run exploitable command to get the output)…

Read Article →
Clepta is a modern keylogger.

Clepta is a modern keylogger.

January 17, 2015
Mr.Trojans
Cryptography, Exploits, Penetration Test

Clepta is greek for Thief. Clepta is a JavaScript library made to be a PoC to show how easy it is to do targetted password…

Read Article →
MISP v-v2.3.39 released - Malware Information Sharing Platform.

MISP v-v2.3.39 released – Malware Information Sharing Platform.

January 12, 2015
Mr.Trojans
Framework

NOTICE FROM US : FOR IT SECURITY PROFFESIONAL ONLY! AND EDUCATION PURPOSE ONLY! DON’T BE EVIL!!!  v2.3 brings important improvements in features, performance and usability:…

Read Article →
← Previous 1 … 9 10

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools