PoshC2 – A proxy aware C2 framework used to aid red teamers with post-exploitation and lateral movement.
#proxy #PoshC2 #C2 #redteam
https://copycookie.com/poshc2-a-proxy-aware-c2-framework-used-to-aid-red-teamers-with-post-exploitation-and-lateral-movement/
#proxy #PoshC2 #C2 #redteam
https://copycookie.com/poshc2-a-proxy-aware-c2-framework-used-to-aid-red-teamers-with-post-exploitation-and-lateral-movement/
Katana- Python Tool For Google Hacking
#GoogleHacking #Google #Katana #proxy
https://reconshell.com/katana-python-tool-for-google-hacking/
#GoogleHacking #Google #Katana #proxy
https://reconshell.com/katana-python-tool-for-google-hacking/
Penetration Testing Tools, ML and Linux Tutorials
Katana- Python Tool For Google Hacking - Penetration Testing Tools, ML and Linux Tutorials
Katana-ds (ds for dork_scanner) is a simple python tool that automates Google Hacking/Dorking and supports TOR. It becomes a more powerful in combination
Asynchronous reverse shell using the HTTP protocol
#ReverseShell #HTTP #UDP #Proxy #HTTPprotocol
https://reconshell.com/asynchronous-reverse-shell-using-the-http-protocol/
#ReverseShell #HTTP #UDP #Proxy #HTTPprotocol
https://reconshell.com/asynchronous-reverse-shell-using-the-http-protocol/
Penetration Testing Tools, ML and Linux Tutorials
Asynchronous reverse shell using the HTTP protocol. - Penetration Testing Tools, ML and Linux Tutorials
Today there are many ways to create a reverse shell in order to be able to remotely control a machine through a firewall. Indeed, outgoing connections are not
Extended XSS Searcher and Finder
#xss #burp #proxy #xssfinder
https://reconshell.com/extended-xss-searcher-and-finder/
#xss #burp #proxy #xssfinder
https://reconshell.com/extended-xss-searcher-and-finder/
Penetration Testing Tools, ML and Linux Tutorials
Extended XSS Searcher and Finder - Penetration Testing Tools, ML and Linux Tutorials
XSS Searcher is the extended version based on the initial idea already published as "xssfinder". This private version allows an attacker to perform not only
Multi-hop proxy tool for security researchers
#socks5 #proxy #SecurityResearchers #Pentester #ProxyTool
https://reconshell.com/stowaway-multi-hop-proxy-tool-for-security-researchers/
#socks5 #proxy #SecurityResearchers #Pentester #ProxyTool
https://reconshell.com/stowaway-multi-hop-proxy-tool-for-security-researchers/
Penetration Testing Tools, ML and Linux Tutorials
Stowaway - Multi-hop proxy tool for security researchers - Penetration Testing Tools, ML and Linux Tutorials
Stowaway is Multi-hop proxy tool for security researchers and pentesters. Users can easily proxy their network traffic to intranet nodes (multi-layer).
Modlishka - powerful and flexible HTTP reverse proxy
#proxy #ReverseProxy #DomainHooking #MiTM #CyberSecurity #HTTPReverseProxy
https://reconshell.com/modlishka-powerful-and-flexible-http-reverse-proxy/
#proxy #ReverseProxy #DomainHooking #MiTM #CyberSecurity #HTTPReverseProxy
https://reconshell.com/modlishka-powerful-and-flexible-http-reverse-proxy/
Penetration Testing Tools, ML and Linux Tutorials
Modlishka - powerful and flexible HTTP reverse proxy - Penetration Testing Tools, ML and Linux Tutorials
It implements an entirely new and interesting approach of handling browser-based HTTP traffic flow, which allows to transparently proxy multi-domain
Sshtunnel - SSH Tunnel To Remote Server
#SSHTunnel #Proxy #socks5
https://reconshell.com/sshtunnel-ssh-tunnel-to-remote-server/
#SSHTunnel #Proxy #socks5
https://reconshell.com/sshtunnel-ssh-tunnel-to-remote-server/
MSSQLProxy – Toolkit For Lateral Movement in restricted environments through compromised Microsoft SQL Server
#proxychains #Proxy #MSSQLProxy #SQL #InfoSec #CyberSecurity #Impacket
https://upurl.me/hfzgz
#proxychains #Proxy #MSSQLProxy #SQL #InfoSec #CyberSecurity #Impacket
https://upurl.me/hfzgz
Penetration Testing Tools, ML and Linux Tutorials
MSSQLProxy - Toolkit For Lateral Movement in restricted environments through compromised Microsoft SQL Server - Penetration Testing…
MSSQLProxy is a toolkit aimed to perform lateral movement in restricted environments through a compromised Microsoft SQL Server via socket reuse. The client
mubeng - An incredibly fast proxy checker & IP rotator
#proxy #mubeng #BurpSuite #OWASP #ZAP #ProxyChain
https://reconshell.com/mubeng-an-incredibly-fast-proxy-checker-ip-rotator/
#proxy #mubeng #BurpSuite #OWASP #ZAP #ProxyChain
https://reconshell.com/mubeng-an-incredibly-fast-proxy-checker-ip-rotator/
Penetration Testing Tools, ML and Linux Tutorials
mubeng - An incredibly fast proxy checker & IP rotator - Penetration Testing Tools, ML and Linux Tutorials
mubeng has 2 core functionality:
Small and convenient C2 tool for Windows targets
#Backdoor #C2 #Proxy #PostExploitation #Malware
https://reconshell.com/microbackdoor-small-and-convenient-c2-tool/
#Backdoor #C2 #Proxy #PostExploitation #Malware
https://reconshell.com/microbackdoor-small-and-convenient-c2-tool/
PyExchangePasswordSpray - Microsoft Exchange password spray tool
#Proxy #BruteForce #MicrosoftExchange #Microsoft #Hacking
https://reconshell.com/pyexchangepasswordspray-microsoft-exchange-password-spray-tool/
#Proxy #BruteForce #MicrosoftExchange #Microsoft #Hacking
https://reconshell.com/pyexchangepasswordspray-microsoft-exchange-password-spray-tool/
Penetration Testing Tools, ML and Linux Tutorials
PyExchangePasswordSpray - Microsoft Exchange password spray tool - Penetration Testing Tools, ML and Linux Tutorials
https://github.com/iomoath/PyExchangePasswordSpray
Bypass Cisco Umbrella DNS Proxy Firewall Restrictions
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
#Firewall #Proxy #CiscoUmbrella #Cisco #DNS #network
https://reconshell.com/bypass-cisco-umbrella-dns-proxy-firewall-restrictions/
ligolo-ng – An advanced tunneling and pivoting tool
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
#Meterpreter #SOCKS #proxy #tunneling #pivoting
https://reconshell.com/ligolo-ng-an-advanced-tunneling-and-pivoting-tool/
Penetration Testing Tools, ML and Linux Tutorials
ligolo-ng - An advanced tunneling and pivoting tool - Penetration Testing Tools, ML and Linux Tutorials
Ligolo-ng is a simple, lightweight and fast tool that allows pentesters to establish tunnels from a reverse TCP/TLS connection
gotor – OSINT analysis on Tor sites
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
#OSINT #Tor #TorBrowser #Socks5 #Proxy #TorBot
https://reconshell.com/gotor-osint-analysis-on-tor-sites/
Penetration Testing Tools, ML and Linux Tutorials
gotor - OSINT analysis on Tor sites - Penetration Testing Tools, ML and Linux Tutorials
This is TorBot ported to Golang.
pocsuite3 - Open Sourced remote vulnerability testing framework
#SecurityResearchers #vulnerability #PenetrationTesters
#Zoomeye #Shodan #proxy
https://reconshell.com/pocsuite3-open-sourced-remote-vulnerability-testing-framework/
#SecurityResearchers #vulnerability #PenetrationTesters
#Zoomeye #Shodan #proxy
https://reconshell.com/pocsuite3-open-sourced-remote-vulnerability-testing-framework/
Penetration Testing Tools, ML and Linux Tutorials
pocsuite3 - Open Sourced remote vulnerability testing framework - Penetration Testing Tools, ML and Linux Tutorials
pocsuite3 is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the Knownsec 404 Team. It comes with a
BugBounty Openvpn socks
#proxychains #BBRF #SOCKS5 #BurpSuite
#BugBounty #Openvpn #proxy #InfoSec
https://reconshell.com/bugbounty-openvpn-socks/
#proxychains #BBRF #SOCKS5 #BurpSuite
#BugBounty #Openvpn #proxy #InfoSec
https://reconshell.com/bugbounty-openvpn-socks/
Penetration Testing Tools, ML and Linux Tutorials
BugBounty Openvpn socks - Penetration Testing Tools, ML and Linux Tutorials
This project uses Docker to run multiple VPN tunnels simultaneously from the same machine, and exposes a SOCKS proxy for each separate VPN connection.
reFlutter Reverse Engineering Framework
#ReverseEngineering #BurpSuite #Proxy #Flutter
https://reconshell.com/reflutter-reverse-engineering-framework/
#ReverseEngineering #BurpSuite #Proxy #Flutter
https://reconshell.com/reflutter-reverse-engineering-framework/
Penetration Testing Tools, ML and Linux Tutorials
reFlutter Reverse Engineering Framework - Penetration Testing Tools, ML and Linux Tutorials
This framework helps with Flutter apps reverse engineering using the patched version of the Flutter library which is already compiled and ready for app
Darkweb Forensics & Investigation Overview BY D3
#darkweb #deepweb #forensic #osint #darkint #webint
#hack #intelligence #attribution #proxy #cybint #india
#investigation #recon #csam #threat #hunting #D3
https://reconshell.com/darkweb-forensics-investigation-overview-by-d3/
#darkweb #deepweb #forensic #osint #darkint #webint
#hack #intelligence #attribution #proxy #cybint #india
#investigation #recon #csam #threat #hunting #D3
https://reconshell.com/darkweb-forensics-investigation-overview-by-d3/