The IPv6Tools framework is a robust set of modules and plugins that allow a user to audit an IPv6 enabled…
Define your system in Python using the elements and properties described in the pytm framework. Based on your definition, pytm…
InjuredAndroid is a vulnerable Android application with ctf examples based on bug bounty findings, exploitation concepts, and pure creativity. Setup…
FockCache is a minimalized test cache poisoning. It tries to make cache poisoning by trying X-Forwarded-Host and X-Forwarded-Scheme headers on…
Acunetix is the pioneer in automated web application security software, has announced the release of Acunetix Version 13. The new…
SEcraper is a search engine scraper tool with BASH script. Dependency curl (cli) Available Search Engine Ask.comSearch.yahoo.comBing.com Also Read -…
Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using it and test them against…
Sub-domain TakeOver vulnerability occur when a sub-domain (subdomain.example.com) is pointing to a service (e.g: GitHub, AWS/S3,..) that has been removed…
MISP is a dashboard showing live data and statistics from the ZMQ feeds of one or more MISP instances. The…
Dufflebag is a tool that searches through public Elastic Block Storage (EBS) snapshots for secrets that may have been accidentally…