Wednesday, January 16, 2019

Blog

Blog articles other than tutorials.

Blog

Home Blog
Blog articles other than tutorials.

No posts to display

Must Need

DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...
UploadScanner

UploadScanner : HTTP file upload scanner for Burp Proxy

UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Blind-Bash

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide...
Droidefense

Droidefense – Advance Android Malware Analysis Framework

Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and...
Best Hacking Books

Best Hacking Books, Tools & Resources 2018

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...