Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Attack Research   /   Page 12
Certerator - Code Signing Certificate Generator.

Certerator – Code Signing Certificate Generator.

February 26, 2016
lee
Code Scripting, Encryption, Penetration Test

Certerator is A tool to generate a custom code signing certificate chain and generate instructions to sign a binary. Useful for establishing persistence on a…

Read Article →
sshak - SSH brute force attack tool.

sshak – SSH brute force attack tool.

February 26, 2016
L3G10n
Brute Force

sshak is a ssh brute force attack tool written in Go. The name derived from AK-47 that is famous semi-automatic rifles. Note: ip4:icmp is a…

Read Article →
The Social-Engineer Toolkit (SET) v7.0.3 Codename: 'RemembRance'.

The Social-Engineer Toolkit (SET) v7.0.3 Codename: ‘RemembRance’.

February 23, 2016
cydec
Penetration Test

Changelog v7.0.3: + fix for python2 to 3 on mass mailer ( latest change v7.0.3.5) + fix issue where set.config was not properly created before…

Read Article →
wepcrack - A program to identify a WEP key on 5 or 13 bytes using FMS and A_s13 Korek attacks.

wepcrack – A program to identify a WEP key on 5 or 13 bytes using FMS and A_s13 Korek attacks.

February 22, 2016
cydec
Networking, Penetration Test, Wireless/wifi

Wepcrack allows finding a WEP key over 5 or 13 bytes using the sniffed packets using Korek’s FMI and A_s13 attacks. A tool to generate…

Read Article →
Pocsuite v1.1.0 released ~  A remote vulnerability test framework.

Pocsuite v1.1.0 released ~ A remote vulnerability test framework.

February 21, 2016
HoChi-Minh
Framework, Penetration Test

changelog v1.1.0: + settings.py :conf.requiresFreeze + parser.py: Check install_requires after register + Merge pull request #41 from knownsec/dev Pocsuite History Year-Pocsuite know security research team…

Read Article →
PSMSF - create powershell shell code used in cmd console with Metasploit Framework.

PSMSF – create powershell shell code used in cmd console with Metasploit Framework.

February 20, 2016
K-159
Browser, Code Scripting, Exploits, Penetration Test

Notice: Just For educational purpose only! PSMSF can help us generate payload or files used in cmd console/browser/.. with Metasploit-Framework. If you are similar to…

Read Article →
kisskissie - Simple proof of concept eXternal Xml Entity (XXE) scan and exfiltrate tool.

kisskissie – Simple proof of concept eXternal Xml Entity (XXE) scan and exfiltrate tool.

February 19, 2016
EL-Capitan
Fuzzer/Fuzzing, Penetration Test

Kisskissie is a tool to automate XXE exfiltration easier.You should use this tool after you have confirmed that your target is vulnerable to XXE and…

Read Article →
PentestDB - Penetration test database.

PentestDB – Penetration test database.

February 17, 2016
HoChi-Minh
Brute Force, Exploits, Penetration Test

Penetration test database for penetration testing provides common dictionary attack payload, webshell, etc., and include commonly used scripts. With Feature: 1. Common script Project python…

Read Article →
← Previous 1 … 11 12 13 … 40 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools