Wednesday, October 24, 2018
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-3

burp-intruder-3

intruder
burpsuite
burpsuite

Must Need

PhEmail

PhEmail Open Source Tool to Sending Phishing Emails Automatically

PhEmail is a python open source phishing email tool that mechanizes the way toward sending phishing messages as a component of a social designing...
Unicorn

Unicorn – Downgrade Attack & Inject Shellcode Straight into Memory

A unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's PowerShell attacks...
DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
BYOB

BYOB : Open-Source Project To Build Your Own Botnet

BYOB is an open-source project that provides a framework for security researchers and developers to build and operate a basic botnet to deepen their...
AndroL4b

A Virtual Machine For Assessing Android applications, Reverse Engineering and Malware...

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the accumulation of most recent framework, instructional exercises and labs from various...
mdk3

WiFi Stress Testing Using MDK3, Beacon Flooding & Deauthentication Attack.

MDK3 is a proof of concept tool. It is used for stress testing 802.11 networks(wifi). It consists of various methods by which we can...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...