Saturday, May 30, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-4

burp-intruder-4

intruder
burpsuite
burpsuite

Must Need

URLextractor : Information Gathering & Website Reconnaissance

URLextractor : Information Gathering & Website Reconnaissance

URLextractor is a tool for Information Gathering & Website Reconnaissance. Following are some of the features of this tool;

Five Benefits That Will Convince You to Integrate Your Systems

In today’s day and age, running a business means using complex technological systems. That’s both a good and a bad thing. It has...
Python-Nubia

Python-Nubia : A Command-Line & Interactive Shell Framework

Python-Nubia is a lightweight framework for building command-line applications with Python. It was originally designed for the “logdevice interactive shell (aka. ldshell)” at Facebook....
Tinfoil Chat – Onion Routed, Endpoint Secure Messaging System

Tinfoil Chat – Onion Routed, Endpoint Secure Messaging System

Tinfoil Chat (TFC) is a FOSS+FHD peer-to-peer messaging system that relies on high assurance hardware architecture to protect users from passive collection,...
BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack

BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC...

BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. It can work with any...
How to Create a Cybersecurity Incident Response Plan

How to Create a Cybersecurity Incident Response Plan

No matter how much businesses invest in employee training and tools and technology, there continue to be issues related to cybersecurity. Many...
SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’ Misconfigurations & Vulnerabilities Within Sudo

SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’...

SUDO KILLER is a tool which help to abuse SUDO in different ways and with the main objective of performing a privilege...