Tuesday, January 22, 2019

Vulnerability Analysis

Vulnerability Analysis Tools

Vulnerability Analysis

Home Vulnerability Analysis
Vulnerability Analysis Tools

No posts to display

Must Need

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
Fluxion

Fluxion – Remake Of Linset By VK496 With Less Bugs &...

Fluxion is the future of MITM WPA attacks. Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by...
WSSAT

WSSAT – Web Service Security Assessment Tool

WSSAT is an open source web service security scanning tool which provides a dynamic environment to add, update or delete vulnerabilities by just editing...
PureBlood

PureBlood – A Penetration Testing Framework created for Hackers / Pentester...

PureBlood is a tool for penetration testing framework created for Hackers / Pentester / Bug Hunter. Thanks to Cr4sHCoD3 for developing the tool. Also Read Dejavu...
Microctfs

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker. Microctfs Logviewer Build and Start logviewer challenge exposed on port 8000 cd logviewer docker build -t logviewer...
FindYara

FindYara – IDA Python Plugin To Scan Binary With Yara Rules

FindYara uses IDA python plugin to scan your binary with yara rules. All the yara rule matches will be listed with their offset so...