Saturday, May 30, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-10

burp-intruder-10

intruder
burpsuite
burpsuite

Must Need

How to Send a Fax Without a Phone Line? With Fax Online Service

How to Send a Fax Without a Phone Line? With Fax...

Most people today are unaware of what a fax is, leave alone how to operate a fax machine. Although it may seem...

How To Save Time With Automated Transcription Software

How To Save Time With Automated Transcription Software  Automated audio to text transcription tools are slowly becoming an integral part of office necessities. Today,...
Drozer 2.4.4

Drozer v2.4.4 – The Leading Security Assessment Framework For Android

Drozer 2.4.4  is the leading security testing framework for Android. Drozer allows you to search for security vulnerabilities in apps and devices by assuming...
Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis & Function Clustering

Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis &...

Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built...
LAPSToolkit

LAPSToolkit : Tool to Audit & Attack LAPS Environments

LAPSToolkit functions written in PowerShell that leverage PowerView to audit and attack Active Directory environments that have deployed Microsoft's Local Administrator Password...
Evilginx2

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials...

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...
Memhunter : Live Hunting Of Code Injection Techniques

Memhunter : Live Hunting Of Code Injection Techniques

Memhunter is an endpoint sensor tool that is specialized in detecing resident malware, improving the threat hunter analysis process and ...