Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …

Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …
0 Disclaimer (The author did not participate in the XX action, don’t trace it) This tool is only for legally …
Motivation During the forensic analysis of a Windows machine, you may find the name of a deleted prefetch file. While …
ZenBuster is a multi-threaded, multi-platform URL enumeration tool written in Python by Zach Griffin (@0xTas). I wrote this tool as …
Probe and discover HTTP pathname using brute-force methodology and filtered by specific word or 2 words at once. Purpose Brute-forcing …
A simple multi-threaded distributed SSH brute-forcing tool written in Python. How it Works When the script is executed without the …
Explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you will find: flag …
WordPress user enumeration and login Brute Force tool for Windows and Linux With the Brute Force tool, you can control …
0d1n is a tool for automating customized attacks against web applications. This tool is very faster because uses thread pool …
enum4linux-ng.py is a rewrite of Mark Lowe’s (former Portcullis Labs now Cisco CX Security Labs) enum4linux.pl, a tool for enumerating …