Monday, February 18, 2019
Home Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing burp16

burp16

burpsuite

Spider Status

burpsuite
Burpsuite

Must Need

Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development...

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL Injection. Practically using sqlmap,...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...
Windows 95

Windows 95 : Windows 95 in Electron That Runs on macOS,...

This is Windows 95, running in an Electron app, which runs on macOS, Linux, and Windows. Bear in mind that this is...
Scanner CLI

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your...
Telewreck

Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248

Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect vulnerable versions of Telerik Web...
UBoat

UBoat – A POC HTTP Botnet Project

UBoat HTTP is a POC HTTP Botnet designed to replicate a full weaponized commercial botnet. UBoat Uses Coded in C++ with no dependencies Encrypted C&C...