Monday, July 13, 2020

Security Hacker

Security Hacker

Home Security Hacker
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason...

Must Need

Flightsim

Flightsim : Utility to Generate Malicious Network Traffic & Evaluate Controls

Flightsim is a lightweight utility used to generate malicious network traffic and help security teams to evaluate security controls and network visibility.
HashPump

HashPump – Tool To Exploit Hash Length Extension Attack In Various...

HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump...
Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.
Iris : WinDbg Extension To Display Windows Process Mitigations

Iris : WinDbg Extension To Display Windows Process Mitigations

Iris WinDbg extension performs detection of common Windows process mitigations (32 and 64 bits).
HUNT

HUNT – Burp Suite Pro/Free and OWASP ZAP Extensions

HUNT Suite is a collection of Burp Suite Pro/Free and OWASP ZAP extensions. Identifies common parameters vulnerable to certain vulnerability classes (Burp Suite Pro...
Wotop : Web On Top Of Any Protocol

Wotop : Web On Top Of Any Protocol

WOTOP is a tool meant to tunnel any sort of traffic over a standard HTTP channel. Useful for scenarios where there's a...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )