mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-10 13:44:12 +00:00
Adding new tools
This commit is contained in:
parent
969b6f96ea
commit
2aa43358ec
1 changed files with 1 additions and 0 deletions
|
@ -2,6 +2,7 @@
|
||||||
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
||||||
|
|
||||||
----
|
----
|
||||||
|
- [PoshBot - Powershell-based Bot Framework](http://feedproxy.google.com/~r/PentestTools/~3/ikhDVgrscXM/poshbot-powershell-based-bot-framework.html)
|
||||||
- [Freki - Malware Analysis Platform](http://feedproxy.google.com/~r/PentestTools/~3/MLNVFfU75oI/freki-malware-analysis-platform.html)
|
- [Freki - Malware Analysis Platform](http://feedproxy.google.com/~r/PentestTools/~3/MLNVFfU75oI/freki-malware-analysis-platform.html)
|
||||||
- [Ghost Framework - An Android Post-Exploitation Framework That Exploits The Android Debug Bridge To R emotely Access An Android Device](http://feedproxy.google.com/~r/PentestTools/~3/AdtTp3q8crU/ghost-framework-android-post.html)
|
- [Ghost Framework - An Android Post-Exploitation Framework That Exploits The Android Debug Bridge To R emotely Access An Android Device](http://feedproxy.google.com/~r/PentestTools/~3/AdtTp3q8crU/ghost-framework-android-post.html)
|
||||||
- [APKLab - Android Reverse Engineering WorkBench For VS Code](http://feedproxy.google.com/~r/PentestTools/~3/xTftfJ4sHT0/apklab-android-reverse-engineering.html)
|
- [APKLab - Android Reverse Engineering WorkBench For VS Code](http://feedproxy.google.com/~r/PentestTools/~3/xTftfJ4sHT0/apklab-android-reverse-engineering.html)
|
||||||
|
|
Loading…
Reference in a new issue