Wednesday, September 18, 2019
Home Authors Posts by Ravi Sankar

Ravi Sankar

Must Need

CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Scanner CLI

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your...
Evilginx2

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials...

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...
SSHD Poison : A Tool To Get Creds Of Pam Based SSHD Authentication

SSHD Poison : A Tool To Get Creds Of Pam Based...

SSHD Poison is a tool to get creds of pam based sshd authentication, this is not the easiest way to do that...
XssPy

XssPy – Web Application XSS Scanner

XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty...
Droid Hunter

Droid Hunter – Android Application Vulnerability Tool

Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java...
Leaked

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout