Saturday, June 6, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-13

burp-intruder-13

intruder
burpsuite
burpsuite

Must Need

Sparrow WiFi : Next-Gen GUI-based WiFi & Bluetooth Analyzer for Linux

Sparrow WiFi : Next-Gen GUI-based WiFi & Bluetooth Analyzer for Linux

Sparrow WiFi has been built from the ground up to be the next generation 2.4 GHz and 5 GHz WiFi spectral...
What’s the best Internet Service Provider in NYC?

What’s the best Internet Service Provider in NYC?

The Internet is no longer a luxury. It is a part of our daily lives and imagining life without it seems impossible....
RootOS

RootOS – macOS Root Helper

rootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL...
Covenant : A .NET Command & Control Framework That Aims To Highlight The Attack Surface

Covenant : A .NET Command & Control Framework That Aims To...

Covenant is a .NET command and control framework that aims to highlight the attack surface of .NET, make the use of offensive...
GoBuster : Directory/File, DNS & VHost Busting Tool Written In Go

GoBuster : Directory/File, DNS & VHost Busting Tool Written In Go

Gobuster is a tool used to brute-force like URIs (directories and files) in web sites, DNS subdomains (with wildcard support) and Virtual...
PoshC2 : Python Server for PoshC2

PoshC2 : Python Server for PoshC2

PoshC2 is a proxy aware C2 framework that utilises Powershell and/or equivalent (System.Management.Automation.dll) to aid penetration testers with red teaming, post-exploitation and lateral movement....
Pyrdp : MITM & Library For Python 3 With The Ability To Watch Connections Live Or After The Fact

Pyrdp : MITM & Library For Python 3 With The Ability...

PyRDP is a Python 3 Remote Desktop Protocol (RDP) Man-in-the-Middle (MITM) and library. It features a few tools: RDP...