Saturday, June 6, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-5

burp-intruder-5

intruder
burpsuite
burpsuite

Must Need

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It's an information security audit tool that creates intelligent wordlists based on...
Sylkie

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery...
Arjun

Arjun : HTTP Parameter Discovery Suite

Also Read - PFQ : Functional Network Framework for Multi-Core Architectures Usage
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Aztarna

Aztarna – A Footprinting Tool For Robots

This repository contains Alias Robotic's aztarna, a footprinting tool for robots. Alias Robotics supports original robot manufacturers assessing...
Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...
Proton : Windows Post-Exploitation Framework Similar

Proton : Windows Post-Exploitation Framework Similar

Proton Framework is a Windows post-exploitation framework similar to other penetration testing frameworks. The major difference is that it ...