Wednesday, October 24, 2018
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-1

burp-intruder-1

intruder

Opening the Target Page

burpsuite

Must Need

HABU

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...
nmap-bootstrap-xsl

Nmap-Bootstrap-XSL : A Nmap XSL implementation with Bootstrap

Nmap-Bootstrap-XSL is a  Nmap XSL implementation with Bootstrap. Nmap-Bootstrap-XSL Usage Add the nmap-bootstrap.xsl as stylesheet to your Nmap scan. Example: nmap -sS -T4 -A -sC -oA...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
IP-Biter

IP-Biter : The Hacker-friendly E-Mail Tracking Framework

IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed in e-mails,...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
WiFi Bruteforcer

WiFi Bruteforcer – Android Application To Brute Force WiFi Passwords

WiFi Bruteforcer is an android application to brute force WiFi passwords without requiring a rooted device. WARNING: This project is still under development and by...