Pwndrop Logo

Pwndrop

0
Free
Visit Website

Pwndrop is a self-deployable file hosting service designed for red teamers, allowing users to easily upload and share payloads over HTTP and WebDAV. It provides a convenient way to host and manage files, making it an ideal solution for penetration testers and red teamers. With Pwndrop, users can quickly and securely share files with team members or clients, streamlining the collaboration process. The service is highly customizable, allowing users to tailor it to their specific needs and workflows. Pwndrop is built with security in mind, featuring robust security measures to protect sensitive data. The platform is highly scalable, making it suitable for large-scale operations. With its ease of use, flexibility, and robust security features, Pwndrop has become a go-to solution for red teamers and penetration testers worldwide. The platform is open-source, allowing developers to contribute to its development and customization. Pwndrop is licensed under the GPL-3.0 license, ensuring that it remains free and accessible to the cybersecurity community.

FEATURES

ALTERNATIVES

Hidden parameters discovery suite

Darkarmour is a Windows AV evasion tool that helps bypass antivirus software, allowing for the creation of undetectable malware.

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.

Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.

A tool that visits suspected phishing pages, takes screenshots, and extracts interesting files.

A set of YARA rules for identifying files containing sensitive information

A post-exploitation framework for attacking running AWS infrastructure

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved