Saturday, May 30, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-1

burp-intruder-1

intruder

Opening the Target Page

burpsuite

Must Need

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
HostHunter

HostHunter : To Discover Hostnames Using OSINT

HostHunter is a recon tool for discovering hostnames using OSINT techniques. HostHunter v1.5 is a tool to efficiently discover...
Metasploitable3 on Windows

How to Install Metasploitable3 on Windows 10

A good home lab is indispensable for an ethical hacker to practice his/her craft without causing grief to others. A budding Pen...
WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting A Website

WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting...

WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. To do its magic, WAFW00F does the following: Sends a...
Manul : A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries On Windows, Linux & Macos

Manul : A Coverage-Guided Parallel Fuzzer For Open-Source And Blackbox Binaries...

Manul is a coverage-guided parallel fuzzer for open-source and black-box binaries on Windows, Linux and macOS (beta) written in pure Python.
Liffy : Local File Inclusion Exploitation Tool

Liffy : Local File Inclusion Exploitation Tool

Liffy is a local file inclusion exploitation tool. A little python tool to perform Local file inclusion. Liffy-v2.0 is...

smurf6

Perform a Smurf attackĀ  andĀ  a Distributed Denial of Service (DDoS) attack on a on whole IPv6 network using smurf6 Smurf6 is a tool to...