
Top Twenty Most Exploited Vulnerabilities in 2021
The number of vulnerabilities in 2021 have dramatically increased so that the technical teams in charge of the patch management find themselves drowning in a myriad of critical and urgent task
Group Policy Preferences Password Finder (GP3Finder) searches for and decrypts passwords stored in Group Policy Preference items on sysvol of the domain controller, local host, or any specified share of a remote host. Also allows decryption of manually retrieved cpassword.
Faraday introduces a new concept (IPE) Integrated Penetration-Test Environment a multiuser Penetration test IDE. Designed for distribution, indexation and analysis of the generated data during the process of a security audit.
Jack is a web based tool to illustrate ClickJacking vulnerabilities found in web applications.
VxStream Sandbox is an innovative and fully automated malware analysis system that includes Hybrid Analysis technology.
Crawlic is a Web Recon Tool (find temporary files, parse robots.txt, search folders, google dorks and search domains hosted on same server)
Sleepy Puppy is a cross-site scripting (XSS) payload management framework which simplifies the ability to capture, manage, and track XSS propagation over long periods of time.
CrackMapExec is your one-stop-shop for pentesting Windows/Active Directory environments!
INURLBR Scanner Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.
Inveigh is a Windows PowerShell LLMNR/NBNS spoofer designed to assist penetration testers that find themselves limited to a Windows system. This can commonly occur while performing standard post exploitation, phishing attacks, USB drive attacks, VLAN pivoting, or simply being restricted to a Windows system as part of client imposed restrictions.