Deploy jekil/awesome-hacking to github.com/jekil/awesome-hacking.git:gh-pages

parent 71ee5347
......@@ -457,6 +457,7 @@ Exploiting
- `Shellsploit <https://github.com/b3mb4m/shellsploit-framework>`_ - Let's you generate customized shellcodes, backdoors, injectors for various operating system. And let's you obfuscation every byte via encoders.
- `SPARTA <http://sparta.secforce.com>`_ - Network Infrastructure Penetration Testing Tool.
- `Spoodle <https://github.com/vjex/spoodle>`_ - A mass subdomain + poodle vulnerability scanner.
- `SysWhispers <https://github.com/jthuraisamy/SysWhispers#syswhispers>`_ - AV/EDR evasion via direct system calls.
- `Unicorn <https://github.com/trustedsec/unicorn>`_ - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
- `Veil Framework <https://www.veil-framework.com>`_ - A tool designed to generate metasploit payloads that bypass common anti-virus solutions.
- `Vuls <https://github.com/future-architect/vuls>`_ - Vulnerability scanner for Linux/FreeBSD, agentless, written in Go.
......
......@@ -549,6 +549,7 @@ docker-compose build &amp;&amp; docker-compose up</p>
<li><p><a class="reference external" href="https://github.com/b3mb4m/shellsploit-framework">Shellsploit</a> - Let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders.</p></li>
<li><p><a class="reference external" href="http://sparta.secforce.com">SPARTA</a> - Network Infrastructure Penetration Testing Tool.</p></li>
<li><p><a class="reference external" href="https://github.com/vjex/spoodle">Spoodle</a> - A mass subdomain + poodle vulnerability scanner.</p></li>
<li><p><a class="reference external" href="https://github.com/jthuraisamy/SysWhispers#syswhispers">SysWhispers</a> - AV/EDR evasion via direct system calls.</p></li>
<li><p><a class="reference external" href="https://github.com/trustedsec/unicorn">Unicorn</a> - Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber’s powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.</p></li>
<li><p><a class="reference external" href="https://www.veil-framework.com">Veil Framework</a> - A tool designed to generate metasploit payloads that bypass common anti-virus solutions.</p></li>
<li><p><a class="reference external" href="https://github.com/future-architect/vuls">Vuls</a> - Vulnerability scanner for Linux/FreeBSD, agentless, written in Go.</p></li>
......
This diff is collapsed.
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment