Thursday, October 17, 2019
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-1

burp-intruder-1

intruder

Opening the Target Page

burpsuite

Must Need

Metabigor : Command Line Search Engines Without Any API Key

Metabigor : Command Line Search Engines Without Any API Key

Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key.
Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of PyQt5 & Frida

Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of...

Dwarf is a debugger for reverse engineers, crackers and security analyst. Or you can call it damn, why are raspberries so fluffy...
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...
phishing

ReelPhish – A Real-Time Two-Factor Phishing Tool

Security Firm FireEye Released a new Phishing tool called ReelPhish to simplifies the real-time Phishing attack that is designed to be run on the...
VTHunting : A Tiny Script Used to Generate Report About Virus Total Hunting

VTHunting : A Tiny Script Used to Generate Report About Virus...

VTHunting is a tiny tool based on the VT api version 3 to run daily, weekly or monthly report about malware hunting....

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
Hackertarget

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...