Wednesday, January 16, 2019
Home Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing burp7

burp7

burpsuite

Page Loaded

burpsuite
burpsuite

Must Need

Mercure

Mercure – Tool For Security Managers Who Want To Train Their...

Mercure is a tool for security managers who want to train their colleague to phishing. What Mercure can do: Create email templates Create target lists ...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep...
Phishing Frenzy

Phishing Frenzy – Ruby on Rails Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the...
libsodium

Libsodium – Easy To Use Software Library

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It...
Aron

Aron – A GO Script For Finding Hidden GET & POST...

Aron is a simple GO script for finding hidden GET & POST parameters with bruteforce. Aron Installation $ git clone https://github.com/m4ll0k/Aron.git aron $ cd aron $ go...
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...