Friday, August 23, 2019
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-5

burp-intruder-5

intruder
burpsuite
burpsuite

Must Need

chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to...
Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
BLEAH

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead...
Kubebot

Kubebot : A Security Testing Slackbot On The Google Cloud Platform

Kubebot is a security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform. Data...
Calculator

Calculator : A simple Yet Powerful Calculator that Ships with Windows

The Windows Calculator app is a modern Windows app written in C++ that ships pre-installed with Windows. The...
Rootstealer

Rootstealer – Trick To Inject Commands On Root Terminal

Rootstealer is an example of new attack using X11. This tool is used to detect when linux users open terminal with root and inject...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL Injection. Practically using sqlmap,...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout