Wednesday, June 3, 2020

Vulnerability Analysis

Vulnerability Analysis Tools

Vulnerability Analysis

Home Vulnerability Analysis
Vulnerability Analysis Tools
SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

SeccuBus : Easy Automated Vulnerability Scanning, Reporting & Analysis

Seccubus automates regular vulnerability scans with various tools and aids security people in the fast analysis of its...

WPScan – Checks Vulnerabilities and Spots Security Issues

WPScan effectively scans your WordPress website and checks the vulnerabilities within the core version, plugins, themes, etc helping...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be...

Must Need

Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10...
OWTF

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...

Cangibrina – A Fast & Powerfull Dashboard (admin) Finder

Cangibrina is a multi platform tool which aims to obtain the Dashboard of sites using brute-force over wordlist, google, nmap, and robots.txt Requirements: Python 2.7 ...
Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

Seccomp Tools : Provide Powerful Tools For Seccomp Analysis

Seccomp provide powerful tools for seccomp analysis. This project is targeted to (but not limited to) analyze seccomp sandbox in CTF pwn...
PwnAdventure3

PwnAdventure3 – Game Intentionally Vulnerable To Hacks

PwnAdventure3: Pwnie Island is a limited-release, first-person, true open-world MMORPG set on a beautiful island where anything could happen. That's because this game is...
Evil SSDP : Create Fake UPnP Devices To Phish For Credentials

Evil SSDP : Create Fake UPnP Devices To Phish For Credentials

Evil SSDP responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in...
UserRecon-PY : Find Username In Social Networks

UserRecon-PY : Find Username In Social Networks

Userrecon-PY is a tool used to find usernames in social networks. Installation Install...