XML External Entity – XXE Injection Payload List

6 years ago

In this section, we'll explain what XML external entity injection is, describe some common examples, explain how to find and…

What are the Types of Malware Infecting Your Computer

6 years ago

Malware is a malicious computer program that is designed to infect your system and gain access to sensitive information without…

Corsy : CORS Misconfiguration Scanner

6 years ago

Corsy is a lightweight program that scans for all known mis-configurations in CORS implementations. Requirements It only works with Python 3 and…

Flan : A Pretty Sweet Vulnerability Scanner

6 years ago

Flan Scan is a lightweight network vulnerability scanner. With Flan Scan you can easily find open ports on your network,…

Antispy : Free But Powerful Anti Virus & Rootkits Toolkit

6 years ago

AntiSpy is a free but powerful anti virus and rootkits toolkit.It offers you the ability with the highest privileges that…

RE:TERNAL : Repo Containing Docker-Compose Files & Setup Scripts

6 years ago

RE:TERNAL is a centralized purple team simulation platform. Reternal uses agents installed on a simulation network to execute various known…

SSHTunnel : SSH Tunnels To Remote Server

6 years ago

SSHTunnel is a tool for SSH tunnels to remote server. Installation sshtunnel is on PyPI, so simply run: pip install…

Glances : Top/htop Alternative For GNU/Linux, BSD, Mac OS & Windows OS

6 years ago

Glances is a cross-platform monitoring tool which aims to present a large amount of monitoring information through a curses or Web…

Leprechaun : Tool Used To Map Out Network Data Flow To Help Penetration Testers

6 years ago

Leprechaun purpose of this tool is to help penetration testers identify potentially valuable targets on the internal network environment. By…

RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

6 years ago

RDPThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the…