Adding new tools

This commit is contained in:
santosomar 2020-11-26 20:35:03 +00:00
parent 0c7e033c7e
commit 2aa0d283c6

View File

@ -2,6 +2,7 @@
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools. The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
---- ----
- [N1QLMap - The Tool Exfiltrates Data From Couchbase Database By Exploiting N1QL Injection Vulnerabilities](http://feedproxy.google.com/~r/PentestTools/~3/O33x0AmRMXU/n1qlmap-tool-exfiltrates-data-from.html)
- [Bunkerized-Nginx - Nginx Docker Image Secure By Default](http://feedproxy.google.com/~r/PentestTools/~3/hq2zevJCuyg/bunkerized-nginx-nginx-docker-image.html) - [Bunkerized-Nginx - Nginx Docker Image Secure By Default](http://feedproxy.google.com/~r/PentestTools/~3/hq2zevJCuyg/bunkerized-nginx-nginx-docker-image.html)
- [RedShell - An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server](http://feedproxy.google.com/~r/PentestTools/~3/_jOdO4UnpPs/redshell-interactive-command-prompt.html) - [RedShell - An interactive command prompt that executes commands through proxychains and automatically logs them on a Cobalt Strike team server](http://feedproxy.google.com/~r/PentestTools/~3/_jOdO4UnpPs/redshell-interactive-command-prompt.html)
- [Wsb-Detect - Tool To Detect If You Are Running In Windows Sandbox ("WSB")](http://feedproxy.google.com/~r/PentestTools/~3/cUt1cqbeX2U/wsb-detect-tool-to-detect-if-you-are.html) - [Wsb-Detect - Tool To Detect If You Are Running In Windows Sandbox ("WSB")](http://feedproxy.google.com/~r/PentestTools/~3/cUt1cqbeX2U/wsb-detect-tool-to-detect-if-you-are.html)