Thursday, May 24, 2018

Web Application Analysis

Web Applications Tools

Web Application Analysis

Home Web Application Analysis
Web Applications Tools
whatweb

whatweb

Simple but effective Web Discovery & Web Vulnerability Analysis with whatweb Whatweb is the perfect name for this tool. Simply it...

UA-Tester

Ua-tester - A tool for User Agent WAF,IDS/IPS, Redirection testing UA-tester is a tool to check whether a website provides different...
sqlmap

SQLMAP – DB & User Operations

SQLMAP - Enumeration of Databases & Users from vulnerable web forms. Sqlmap is a database assessment tool which pentesters & security researchers...
burpsuite

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled...
burpsuite

Burpsuite

Getting Started with Burpsuite & Running a basic Web-Spider Burpsuite is a collection of tools bundled into a single suite made...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL...

Must Need

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors....

Unicornscan

Unicornscan Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning  it sends out broken/unorganized/fragmented packets (without a regular pattern unlike other port scanning tools)...

Johnny

Lab 2: Test the complexity of a Windows System, Cracking Windows hashes using Johnny When cracking Windows passwords if LM hashing is not disabled, two...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...
Remove term: WiFi-Pumpkin WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is a complete framework for auditing Wi-Fi security. The main feature is the ability to create a fake AP and make Man In...
libsodium

Libsodium – Easy To Use Software Library

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It...