Monday, June 1, 2020

Security Hacker

Security Hacker

Home Security Hacker

No posts to display

Must Need

Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts

Eavesarp : Analyze ARP Requests To Identify Intercommunicating Hosts

Eavesarp a reconnaissance tool that analyzes ARP requests to identify hosts that are likely communicating with one another, which is useful in...
Metame : Metamorphic Code Engine For Arbitrary Executables

Metame : Metamorphic Code Engine For Arbitrary Executables

Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version...
Noisy

Noisy – Simple random DNS, HTTP/S Internet Traffic Noise Generator

Noisy is a simple python script that generates random HTTP/DNS traffic noise in the background while you go about your regular web browsing, to...
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Five Tips for Hiring a Developer to Create the Perfect App

Five Tips for Hiring a Developer to Create the Perfect App

You could attempt to design and implement a new app along with your existing team, but you’ll probably end up regretting your decision. Although...
Powerob : An On-The-Fly Powershell Script Obfuscator

Powerob : An On-The-Fly Powershell Script Obfuscator

Powerob is an on-the-fly Powershell script obfuscator meant for red team engagements. Built out of necessity. Installation

Firebase – Tool To Exploiting Misconfigured Firebase Databases

Firebase exploiting tool is exploiting misconfigured firebase databases. Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...