attack-vector

5 tools and resources

NEW

Weaponize Word documents with PowerShell Empire using the Microsoft DDE exploit.

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

Troje Logo

Troje

0 (0)

Troje is a honeypot that creates a realistic environment within lxc containers to monitor and record traffic and changes to drives.

An attacker can create a new IAM policy version and set it as the default version without requiring the iam:SetDefaultPolicyVersion permission.

An open-source penetration testing framework for social engineering with custom attack vectors.