Sunday, February 23, 2020
Home Burpsuite – Use Burp Intruder to Bruteforce Forms burp-intruder-8

burp-intruder-8

intruder
burpsuite
burpsuite

Must Need

Cryptr : A Simple Shell Utility For Encrypting & Decrypting Files Using OpenSSL

Cryptr : A Simple Shell Utility For Encrypting & Decrypting Files...

Cryptr is a simple shell utility for encrypting and decryption files using OpenSSL. Installation
PRETty

PRETty : “PRinter Exploitation Toolkit” LAN Automation Tool

PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET...
Tallow

Tallow – Transparent Tor for Windows

Tallow is a small program that redirects all outbound traffic from a Windows machine via the Tor anonymity network. Any traffic that cannot be...
IDArling

IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database...

Docker Tor Hidden Service Nginx – Easily Setup A Hidden Service...

Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the skeleton configuration for you hidden...
AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application Model

AlertResponder : Automatic Security Alert Response Framework By AWS Serverless Application...

AlertResponder is an automatic security alert response framework by AWS Server less Application Model. It is a server less framework for automatic...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL Injection. Practically using sqlmap,...