Monday, August 19, 2019
Home Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing burp8

burp8

burpsuite

Sitemap, Requests & Request/Response Details

burpsuite
burpsuite

Must Need

Blind SQL Bitshifting : A Blind SQL Injection Module That Uses Bitshfting To Calculate Characters

Blind SQL Bitshifting : A Blind SQL Injection Module That Uses...

This is a module that performs blind SQL injection by using the bitshifting method to calculate characters instead of guessing them. It requires 7/8...
LiveHiddenCamera : Library Which Record Live Video & Audio From Android Device Without Displaying A Preview

LiveHiddenCamera : Library Which Record Live Video & Audio From Android...

LiveHiddenCamera is a library which record live video and audio from Android device without displaying a preview.
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
Mr SIP

Mr SIP : SIP-Based Audit and Attack Tool

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help...
Prithvi – Report Generation Tool

Prithvi – Report Generation Tool

Prithvi is a report generation tool specially made for Security Assessment which is free to use and easy to use. It will...
TLS-Scanner

TLS-Scanner : The TLS-Scanner Module from TLS-Attacker

TLS-Scanner is a tool created by the Chair for Network and Data Security from the Ruhr-University Bochum to assist pentesters and security researchers in...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout