Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …

Mimicry is a security tool developed by Chaitin Technology for active deception in exploitation and post-exploitation. Active deception can live …
Lsass NTLM Authentication Backdoor How it Works First, the DLL is injected into the lsass.exe process, and will begin hooking …
DcRat is a simple remote tool written in C# Introduction Features TCP connection with certificate verification, stable and security Server …
CANalyse is a tool built to analyze the log files to find out unique datasets automatically and able to connect …
It’s a simple tool for test vulnerability shellshock Autor: MrCl0wnBlog: http://blog.mrcl0wn.comGitHub: https://github.com/MrCl0wnLabTwitter: https://twitter.com/MrCl0wnLabEmail: mrcl0wnlab\@\gmail.com Shellshock (software bug) Shellshock, also known …
MOSE is a post exploitation tool that enables security professionals with little or no experience with configuration management (CM) technologies …
A Undetectable Payload Generation. This tool is for educational purpose only, usage of Kaiten for attacking targets without prior mutual …
A Massive malware outbreak that distributed through Russian based backdoored BitTorrent client and infected more than 400,000 users within 12 …
OceanLotus APT group as know as s APT32 and APT-C-00, emerging again targeting organization and government networks by distributing backdoor …
A dangerous Linux backdoor Chaos that targeting improperly Secured Linux systems by using fully encrypted and integrity checked reverse shell. Hackers performing …