NSBrute Logo

NSBrute

0
Free
Visit Website

Python utility to takeover domains vulnerable to AWS NS Takeover

FEATURES

ALTERNATIVES

A tool for Local File Inclusion (LFI) exploitation and scanning

A standalone man-in-the-middle attack framework used for phishing login credentials and bypassing 2-factor authentication.

A comprehensive malware-analysis tool that utilizes external AV scanners to identify malicious elements in binary files.

A proxy aware C2 framework for penetration testing, red teaming, post-exploitation, and lateral movement with modular format and highly configurable payloads.

A tool that exposes the functionality of the Volume Shadow Copy Service (VSS) for creation, enumeration, and manipulation of volume shadow copies, with features for persistence and evasion.

A tool that simplifies the installation of tools and configuration for Kali Linux

Open-source Java application for creating proxies for traffic analysis & modification.

A document that helps inform red team planning by contrasting against the very specific red team style described in Red Teams.

PINNED