mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 10:53:03 +00:00
Adding new tools
This commit is contained in:
parent
4ebb00c792
commit
e8b935dd53
1 changed files with 1 additions and 0 deletions
|
@ -2,6 +2,7 @@
|
||||||
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
||||||
|
|
||||||
----
|
----
|
||||||
|
- [CobaltBus - Cobalt Strike External C2 Integration With Azure Servicebus, C2 Traffic Via Azure Servicebus](http://www.kitploit.com/2022/04/cobaltbus-cobalt-strike-external-c2.html)
|
||||||
- [Odin - Central IoC Scanner Based On Loki](http://www.kitploit.com/2022/04/odin-central-ioc-scanner-based-on-loki.html)
|
- [Odin - Central IoC Scanner Based On Loki](http://www.kitploit.com/2022/04/odin-central-ioc-scanner-based-on-loki.html)
|
||||||
- [Subdomains.Sh - A Wrapper Around Tools I Use For Subdomain Enumeration On A Given Domain. This Script Is Written With The Aim To Automate The Workflow](http://www.kitploit.com/2022/04/subdomainssh-wrapper-around-tools-i-use.html)
|
- [Subdomains.Sh - A Wrapper Around Tools I Use For Subdomain Enumeration On A Given Domain. This Script Is Written With The Aim To Automate The Workflow](http://www.kitploit.com/2022/04/subdomainssh-wrapper-around-tools-i-use.html)
|
||||||
- [Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation](http://www.kitploit.com/2022/04/auto-elevate-escalate-from-low.html)
|
- [Auto-Elevate - Escalate From A Low-Integrity Administrator Account To NT AUTHORITY\SYSTEM Without An LPE Exploit By Combining A COM UAC Bypass And Token Impersonation](http://www.kitploit.com/2022/04/auto-elevate-escalate-from-low.html)
|
||||||
|
|
Loading…
Reference in a new issue