Subrake A powerful Subdomain Scanner
#Subrake #SubdomainScanner
https://reconshell.com/subrake-a-powerful-subdomain-scanner/
#Subrake #SubdomainScanner
https://reconshell.com/subrake-a-powerful-subdomain-scanner/
Penetration Testing Tools, ML and Linux Tutorials
Subrake - A powerful Subdomain Scanner - Penetration Testing Tools, ML and Linux Tutorials
Subrake - A Powerful Subdomain Scanner & Validator Written in sockets and requests which makes it a lot more faster and easier to manage. It works by
CVE-2020-0688 Microsoft Exchange Remote Code Execution With POC
#CVE-2020-0688 #RCE #RemoteCodeExecution #Vulnerability #YSoSerial
https://reconshell.com/cve-2020-0688-microsoft-exchange-remote-code-execution-with-poc/
#CVE-2020-0688 #RCE #RemoteCodeExecution #Vulnerability #YSoSerial
https://reconshell.com/cve-2020-0688-microsoft-exchange-remote-code-execution-with-poc/
Obfuscapk – black-box obfuscation tool for Android apps
#Obfuscapk #Android #black-box #AndroidObfuscationTool
https://reconshell.com/obfuscapk-black-box-obfuscation-tool-for-android-apps/
#Obfuscapk #Android #black-box #AndroidObfuscationTool
https://reconshell.com/obfuscapk-black-box-obfuscation-tool-for-android-apps/
Penetration Testing Tools, ML and Linux Tutorials
Obfuscapk - black-box obfuscation tool for Android apps - Penetration Testing Tools, ML and Linux Tutorials
Obfuscapk is a modular Python tool for obfuscating Android apps without needing their source code, since apktool is used to decompile the original apk file
Jok3r v3 Network and Web Pentest Automation Framework
#Pentest #VulnerabilityScanning #ServerExploitation #CVE #CyberSecurity
https://reconshell.com/jok3r-v3-network-and-web-pentest-automation-framework/
#Pentest #VulnerabilityScanning #ServerExploitation #CVE #CyberSecurity
https://reconshell.com/jok3r-v3-network-and-web-pentest-automation-framework/
Penetration Testing Tools, ML and Linux Tutorials
Jok3r v3 - Network and Web Pentest Automation Framework - Penetration Testing Tools, ML and Linux Tutorials
Jok3r is a Python3 CLI application which is aimed at helping penetration testers for network infrastructure and web black-box security tests.
Memhunter Live Hunting Of Code Injection Techniques
#Memhunter #CodeInjection #Malware
https://reconshell.com/memhunter-live-hunting-of-code-injection-techniques/
#Memhunter #CodeInjection #Malware
https://reconshell.com/memhunter-live-hunting-of-code-injection-techniques/
Penetration Testing Tools, ML and Linux Tutorials
Memhunter - Live Hunting Of Code Injection Techniques - Penetration Testing Tools, ML and Linux Tutorials
Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and remediation times. The
Passer python sniffer that identifies servers, clients, names
#sniffer #ettercap #Nmap #wireshark #ArpScan
https://reconshell.com/passer-python-sniffer-that-identifies-servers-clients-names/
#sniffer #ettercap #Nmap #wireshark #ArpScan
https://reconshell.com/passer-python-sniffer-that-identifies-servers-clients-names/
Penetration Testing Tools, ML and Linux Tutorials
Passer - python sniffer that identifies servers, clients, names - Penetration Testing Tools, ML and Linux Tutorials
Passer can work off a live packet capture or from a pcap file (command line parameter, see examples below). It reports live services and clients, ethernet
Aaia – AWS Identity and Access Management Visualizer
#AWS #Aaia #Visualizer #PrivelegeEsclation
https://reconshell.com/aaia-aws-identity-and-access-management-visualizer/
#AWS #Aaia #Visualizer #PrivelegeEsclation
https://reconshell.com/aaia-aws-identity-and-access-management-visualizer/
Penetration Testing Tools, ML and Linux Tutorials
Aaia - AWS Identity and Access Management Visualizer - Penetration Testing Tools, ML and Linux Tutorials
Aaia (pronounced as shown here) helps in visualizing AWS IAM and organizations in a graph format with help of Neo4j. This helps in identifying the outliers
Attack surfaces tools and techniques cheat sheet
#AttackSurface #Hackingtechniques #SANS
https://reconshell.com/attack-surfaces-tools-and-techniques-cheat-sheet/
#AttackSurface #Hackingtechniques #SANS
https://reconshell.com/attack-surfaces-tools-and-techniques-cheat-sheet/
Penetration Testing Tools, ML and Linux Tutorials
Attack surfaces tools and techniques cheat sheet - Penetration Testing Tools, ML and Linux Tutorials
SANS Attack surfaces, tools and techniques cheat sheet | by SANS h9-cheatsheet cheatsheet Download PDF
TorBot - Intelligence Tool for Dark Web
#DarkWeb #DeepWeb #TorBot #IntelligenceTool
https://reconshell.com/torbot-intelligence-tool-for-dark-web/
#DarkWeb #DeepWeb #TorBot #IntelligenceTool
https://reconshell.com/torbot-intelligence-tool-for-dark-web/
Penetration Testing Tools, ML and Linux Tutorials
TorBot - Intelligence Tool for Dark Web - Penetration Testing Tools, ML and Linux Tutorials
TorBot is an open source intelligence tool developed in python. The main objective of this project is to collect open data from the deep web (aka dark web)
IotShark IoT Traffic Monitoring And Analyzing Tool
#IotShark #IoT #mitm #ARPpoisoning #Wireshark #Sniff
https://reconshell.com/iotshark-iot-traffic-monitoring-and-analyzing-tool/
#IotShark #IoT #mitm #ARPpoisoning #Wireshark #Sniff
https://reconshell.com/iotshark-iot-traffic-monitoring-and-analyzing-tool/
Penetration Testing Tools, ML and Linux Tutorials
IotShark - IoT Traffic Monitoring And Analyzing Tool - Penetration Testing Tools, ML and Linux Tutorials
IoTShark aims to provide a fully automated solution for a user to monitor their IOT devices by simply running a single script. The user merely has to select
DroneSploit A pentesting console framework dedicated to drones
#DroneSploit #pentesting #BlackHat #Metasploit #DroneHacking #Exploits
https://reconshell.com/dronesploit-a-pentesting-console-framework/
#DroneSploit #pentesting #BlackHat #Metasploit #DroneHacking #Exploits
https://reconshell.com/dronesploit-a-pentesting-console-framework/
Penetration Testing Tools, ML and Linux Tutorials
DroneSploit - A pentesting console framework - Penetration Testing Tools, ML and Linux Tutorials
DroneSploit was created by Alexandre D’Hondt and Yannick Pasquazzo. The project is still in the development stage, as both developers are working to improve
Free Tools For Incident Response
#IncidentResponse #SANS #SecurityTool #IncidentResponseTools
https://reconshell.com/free-tools-for-incident-response/
#IncidentResponse #SANS #SecurityTool #IncidentResponseTools
https://reconshell.com/free-tools-for-incident-response/
Penetration Testing Tools, ML and Linux Tutorials
Free Tools For Incident Response - Penetration Testing Tools, ML and Linux Tutorials
Incident response is the organized practice of responding to cyber security events. These processes are typically organized into an incident response plan,
Covenant the .NET based C2 on Kali Linux
#C2 #KaliLinux #SharpSploit #exploit #payloads #PowerSploit
https://reconshell.com/covenant-the-net-based-c2/
#C2 #KaliLinux #SharpSploit #exploit #payloads #PowerSploit
https://reconshell.com/covenant-the-net-based-c2/
Penetration Testing Tools, ML and Linux Tutorials
Covenant - The .NET based C2 - Penetration Testing Tools, ML and Linux Tutorials
There are many Command and Control Frameworks for Pentesters and Red Teamers to use. Covenant is a nice .NET based C2 environment that works great on Kali
WAFW00F - Web Application Firewall Fingerprinting Tool
#WAFW00F #WAF #Firewall #Fingerprinting
https://reconshell.com/wafw00f-web-application-firewall-fingerprinting-tool/
#WAFW00F #WAF #Firewall #Fingerprinting
https://reconshell.com/wafw00f-web-application-firewall-fingerprinting-tool/
Penetration Testing Tools, ML and Linux Tutorials
WAFW00F - Web Application Firewall Fingerprinting Tool - Penetration Testing Tools, ML and Linux Tutorials
To do its magic, WAFW00F does the following:
TuxResponse Linux Incident Response
#TuxResponse #IncidentResponse #Linux #Chckrootkit #YARArules #ExifTool
https://reconshell.com/tuxresponse-linux-incident-response/
#TuxResponse #IncidentResponse #Linux #Chckrootkit #YARArules #ExifTool
https://reconshell.com/tuxresponse-linux-incident-response/
Penetration Testing Tools, ML and Linux Tutorials
TuxResponse - Linux Incident Response - Penetration Testing Tools, ML and Linux Tutorials
TuxResponse is incident response script for linux systems written in bash. It can automate incident response activities on Linux systems and enable you to
Multi-hop proxy tool for security researchers
#socks5 #proxy #SecurityResearchers #Pentester #ProxyTool
https://reconshell.com/stowaway-multi-hop-proxy-tool-for-security-researchers/
#socks5 #proxy #SecurityResearchers #Pentester #ProxyTool
https://reconshell.com/stowaway-multi-hop-proxy-tool-for-security-researchers/
Penetration Testing Tools, ML and Linux Tutorials
Stowaway - Multi-hop proxy tool for security researchers - Penetration Testing Tools, ML and Linux Tutorials
Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer).
Mapping-Injection Another Windows Process Injection
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
#ProcessInjection #MappingInjection #shellcode
https://upurl.me/9q3ml
Penetration Testing Tools, ML and Linux Tutorials
Mapping-Injection Another Windows Process Injection - Penetration Testing Tools, ML and Linux Tutorials
Mapping injection is a process injection technique that avoids the usage of common monitored syscall VirtualAllocEx and WriteProcessMemory.
Hakrawler – A fast CLI web crawler for hackers
#Hakrawler #WebCrawler #hackers #SQLMap #amass #XSSscanner
https://upurl.me/enjoq
#Hakrawler #WebCrawler #hackers #SQLMap #amass #XSSscanner
https://upurl.me/enjoq
Penetration Testing Tools, ML and Linux Tutorials
Hakrawler - A fast CLI web crawler for hackers - Penetration Testing Tools, ML and Linux Tutorials
Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can be used to discover: