Saturday, May 30, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-3

burp-intruder-3

intruder
burpsuite
burpsuite

Must Need

Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on...
Carina : Webshell, Virtual Private Server (VPS) & cPanel Database

Carina : Webshell, Virtual Private Server (VPS) & cPanel Database

Carina is a web application used to store webshell, Virtual Private Server (VPS) and cPanel data. Carina is made so that we...
CommandoVM : Complete Mandiant Offensive VM (Commando VM), The First Full Windows-Based Penetration Testing Virtual Machine Distribution

CommandoVM : Complete Mandiant Offensive VM (Commando VM), The First Full...

Welcome to CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install...
Gosec : Golang Security Checker To Inspects Source Code

Gosec : Golang Security Checker To Inspects Source Code

Gosec is a inspects source code for security problems by scanning the Go AST. Licensed under the Apache License, Version 2.0...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
AutoSploit : Automated Mass Exploiter

AutoSploit : Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through...
Cocospy Keylogger

Monitor Smartphone usage with Cocospy Keylogger

No one can doubt the advantages that smartphones have.  For parents, you now have a dependable babysitter with your smart device.  While...