PRINT
PRINT
SEND MAIL
SEND MAIL

DVS – D(COM) V(ulnerability) S(canner) AKA Devious Swiss Army Knife

Did you ever wonder how you can move laterally through internal networks? or interact with remote machines without alerting EDRs?Let's assume that we have a valid credentials, or an active session with access to a remote machine, but we are without an ...

Continue reading

Astsu – A Network Scanner Tool

How it worksScan common ports Send a TCP Syn packet to the destination on the defined port, if the port is open, use an nmap scan to check the service running on the port and prints all the ports found.Discover hosts in network Uses as a base...

Continue reading

ProjectOpal – Stealth Post-Exploitation Framework For WordPress

Stealth post-exploitation framework for Wordpress CMSOfficial ProjectOpal Repository.What is it and why was it made?We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like to pass it on t...

Continue reading

PhpSploit – Stealth Post-Exploitation Framework

PhpSploit is a remote control framework, aiming to provide a stealth interactive shell-like connection over HTTP between client and web server. It is a post-exploitation tool capable to maintain access to a compromised web server for privilege escalati...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account