Aggregator
CVE-2015-5561 | Adobe Flash Player 11.2.202.491/18.0.0.209 use after free (APSB15-19 / Nessus ID 85325)
zTasker v1.99一键定时自动化任务
Chrome App-Bound Encryption Decryption: decrypt App-Bound encrypted keys in Chrome
Chrome App-Bound Encryption Decryption This tool decrypts App-Bound Encrypted (ABE) keys stored in the Local State file of supported Chromium-based browsers, including Google Chrome, Brave, and Microsoft Edge. ABE, introduced in Chrome version 127, binds decryption capabilities...
The post Chrome App-Bound Encryption Decryption: decrypt App-Bound encrypted keys in Chrome appeared first on Penetration Testing Tools.
Above: Invisible protocol sniffer for finding vulnerabilities in the network
Above Invisible protocol sniffer for finding vulnerabilities in the network. Designed for pentesters and security professionals. Mechanics Above is an invisible network sniffer for finding vulnerabilities in network equipment. It is based entirely on...
The post Above: Invisible protocol sniffer for finding vulnerabilities in the network appeared first on Penetration Testing Tools.
BounceBack: Stealth redirector for your red team operation security
BounceBack BounceBack is a powerful, highly customizable, and configurable reverse proxy with WAF functionality for hiding your C2/phishing/etc infrastructure from blue teams, sandboxes, scanners, etc. It uses real-time traffic analysis through various filters and...
The post BounceBack: Stealth redirector for your red team operation security appeared first on Penetration Testing Tools.