Thursday, February 27, 2020

Security Hacker

Security Hacker

Home Security Hacker

No posts to display

Must Need

IdentYWAF

IdentYWAF : Blind WAF Identification Tool

identYwaf is an identification tool that can recognise web protection type (i.e. WAF) based on blind inference. Blind inference is...
Industrial Control System

ISF : Industrial Control System Exploitation Framework

ISF(Industrial Control System Exploitation Framework),a exploitation framework based on Python. Industrial Control System is based on open source project routersploit.
PCI Compliance

PCI Compliance and Network Segmentation

The first step to determining the scope of your Payment Card Industry Data Security Standard (PCI DSS) compliance is segmenting your data networks. Network...
Git Hound – Find Exposed Keys Across GitHub Using Code Search Keywords

Git Hound – Find Exposed Keys Across GitHub Using Code Search...

Git Hound makes it easy to find exposed APi keys on GitHub using pattern matching, targetted querying, and a scoring system.
Telebix

Telebix – Telebix is an application that communicates with a Bot...

Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure monitored by Zabbix,...

Trape – People Tracker On The Internet

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created...
PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...