Wednesday, January 16, 2019
Home Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing burp4

burp4

burpsuite

Configuring Addon Proxy

burpsuite
burpsuite

Must Need

Security Monkey

Security Monkey – AWS & GCP Accounts For Alerts On Insecure...

Security Monkey monitors your AWS and GCP accounts for policy changes and alerts on insecure configurations. Support is available for OpenStack public and private...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
HUNT

HUNT – Burp Suite Pro/Free and OWASP ZAP Extensions

HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability classes (Burp Suite Pro...
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...
Scout2

Scout2 – Security Auditing Tool For AWS Environments

Scout2 is a security tool that lets AWS administrators assess their environment's security posture. Using the AWS API, Scout2 gathers configuration data for manual...
Novahot

Novahot – A Webshell Framework For Penetration Testers

Novahot is a webshell framework for penetration testers. It implements a JSON-based API that can communicate with trojans written in any language....
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...