Thursday, May 24, 2018

Web Application Analysis

Web Applications Tools

Web Application Analysis

Home Web Application Analysis
Web Applications Tools

No posts to display

Must Need

Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...
SQL Injection

Best SQL Injection Tools

SQL injection is a standout amongst the most widely recognized attacks against web applications. Its assault comprises of insertion or "injection" of a SQL...
onion

Onion nmap To Scan Hidden Onion Services

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
chntpw

chntpw

Windows Password, Account Forensics & Change user password with Chntpw chntpw is a Kali Linux tool that can be used to edit the windows registry,...
siem

SIEM – A Beginner’s Guide

What is a SIEM ? SIEM when expanded becomes Security Information Event Management. As it’s name suggests,  the main function of a SIEM is Event...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...