Thursday, November 26, 2020

Web Application Analysis

Web Applications Tools

Web Application Analysis

Home Web Application Analysis
Web Applications Tools
web hacking tools

Top 10 Best Web Hacking Tools

Here is the best web hacking tools that helps you in pen-testing and protecting the websites.
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration Testing

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap...
ua-tester

Ua-tester – A tool for User Agent WAF, IDS/IPS, Redirection testing

UA-tester is a tool to check whether a website provides different pages for different user agents like for mobile, desktop...

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled...
sqlmap

SQLMAP – Introduction & Automation of SQLi

Basic Operation of SQLMAP & enumeration of Server through automatic SQL Injection. SQLMAP is a database pentesting tool used to automate SQL...

Must Need

TinkererShell : A Simple Python Reverse Shell

TinkererShell : A Simple Python Reverse Shell

TinkererShell is a simple python reverse shell written just for fun. Simple reverse shell written in python 3.7 just...
MapCIDR : Small Utility Program To Perform Multiple Operations For A Given sub-net/CIDR Ranges

MapCIDR : Small Utility Program To Perform Multiple Operations For A...

MapCIDR is a small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed...
ParamPamPam

ParamPamPam : Tool For Brute Discover Parameters

ParamPamPam is a tool for brute discover GET and POST parameters Installation With Docker ,Install...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
Top 3 Best Ways to Track Someone by Cell Phone Number

Top 3 Best Ways to Track Someone by Cell Phone Number

There are many people who know quite well how to track someone by cell phone number, but there are some others who...
Libssh-Scanner

Libssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933

Libssh-Scanner is a python based script to identify hosts vulnerable to CVE-2018-10933. Libssh scanner has two modes: passive (banner grabbing) and aggressive (bypass auth)...
Passwordless Authentication

Passwordless Authentication Should Become Mainstream by 2022

Since the days of Ancient Rome and Egypt, people have used passwords to authenticate and grant access. Nowadays, passwords are more common than ever....