Wednesday, May 22, 2019

Vulnerability Analysis

Vulnerability Analysis Tools

Vulnerability Analysis

Home Vulnerability Analysis
Vulnerability Analysis Tools

No posts to display

Must Need

Bashark

Bashark – Bash Pentesters & Security Researchers Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. To launch it on compromised host, simply source the bashark.sh script...
PwnBack

PwnBack – Burp Extender Plugin That Generates A Sitemap Of A...

PwnBack requires PhantomJS to run. To understand why it is required currently see the section PhantomsJS. The plugin has several settings that a user can...
DNSDmpstr

DNSDmpstr : Unofficial API & Client for DnsDumpster & HackerTarget

DNSDmpstr is an unofficial API & Client for DNS Dumpster and HackerTarget.com IP tools. DNS dumpster is a FREE...
NAXSI

NAXSI : WAF For NGINX

NAXSI is an Open-Source, High Performance, Low Rules Maintenance WAF For NGINX. NAXSI means Nginx Anti XSS & SQL Injection.
Archery

Archery – Open Source Vulnerability Assessment & Management Helps Developers &...

Archery is an opensource vulnerability assessment and management tool which helps developers and pentesters to perform scans and manage vulnerabilities. It uses popular opensource...
HT-WPS-Breaker

HT-WPS-Breaker : High Touch WPS Breaker

High Touch HT-WPS-BREAKER is a small tool based on the bash script language, it can help you to extract the wps pin...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...