Saturday, May 30, 2020

Exploitation Tools

Exploitation Tools main menu

Exploitation Tools

Home Exploitation Tools
Exploitation Tools main menu

No posts to display

Must Need

Android Application

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change...
AutoSource : Automated Source Code SonarQube

AutoSource : Automated Source Code SonarQube

AutoSource is an automated source code review framework integrated with SonarQube which is capable of performing static code analysis/reviews.
4nonimizer

4nonimizer – A Bash Script For Anonymizing The Public IP Used...

4nonimizer is a bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs...
Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and...