• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

processes

  1. itsMe

    Rekono v1.4.3 - Execute complete pentesting processes

    Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user via email or Telegram notifications and also can be imported into Defect-Dojo if advanced...
  2. itsMe

    LeakedHandlesFinder - Leaked Windows Processes Handles Identification Tool

    Leaked Windows processes handles identification tool. Useful for identify new LPE vulnerabilities during a pentest or simply as a new research process. Currently supports exploiting (autopwn) procesess leaked handles spawning a new arbitrary process (cmd.exe default). Hidden content
  3. itsMe

    Pentest Collaboration Framework v1.1 - opensource, cross-platform and portable toolkit for automating routine processes

    Pentest Collaboration Framework Pentest Collaboration Framework – an open-source, cross-platform, and portable toolkit for automating routine processes when carrying out various works for testing! Features Structure         👨‍👨‍👦 Teams         Work team         Personal team     ⛑ Pentest...
  4. itsMe

    Reverse Engineering PageBuster: gather dumps of all executable pages of packed processes

    PageBuster There are plenty of scenarios in which the ability to dump executable pages is highly desirable. Of course, there are many methods, some of which standard de facto, but it is not always as easy as it seems. For example, think about the case of packed malware samples. Run-time...
  5. dEEpEst

    C# Kill Processes

    static void Mode() { int lastpos = 0; int elapsed = 0; bool idle = false; while (true) { if (Process.GetProcessesByName("Taskmgr").Length != 0 || Process.GetProcessesByName("Process Hacker").Length != 0) {...
Back
Top