Wednesday, April 14, 2021

Wireless Attacks

Wireless Attacks main menu

Wireless Attacks

Home Wireless Attacks
Wireless Attacks main menu

No posts to display

Must Need

WhatsSpy : Trace The Moves Of A WhatsApp User

WhatsSpy : Trace The Moves Of A WhatsApp User

WhatsSpy Public (not to confuse with WhatsSpy) is an web-oriented application that tracks every move on WhatsApp of whoever you like to...
Explo : Human & Machine Readable Web Vulnerability Testing Format

Explo : Human & Machine Readable Web Vulnerability Testing Format

Explo is a simple tool to describe web security issues in a human and machine readable format. By defining a request/condition workflow,...
DLLHSC : DLL Hijack SCanner A Tool To Assist With The Discovery

DLLHSC : DLL Hijack SCanner A Tool To Assist With The...

DLLHSC(DLL Hijack SCanner) is a tool to generate leads and automate the discovery of candidates for DLL Search Order Hijacking.
Terrier : A Image & Container Analysis Tool

Terrier : A Image & Container Analysis Tool

Terrier is a Image and Container analysis tool that can be used to scan Images and Containers to identify and verify the...
WinObjEx64 : Windows Object Explorer 64-bit

WinObjEx64 : Windows Object Explorer 64-bit

WinObjEx64 is an advanced utility that lets you explore the Windows Object Manager namespace. For certain object types, you can double-click on...
XAttacker

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website...
fragmentation

Fragmentation Enables Massive Data Security Voids

A recent study stated that a large percentile of data security professionals believe that their data security strategy is mature enough to ward off...