Saturday, May 18, 2024
EHA
Home Search

vulnerable - search results

If you're not happy with the results, please do another search

WWWGrep : OWASP Foundation Web Respository

0
WWWGrep is a rapid search “grepping” mechanism that examines HTML elements by type and permits focused (single), multiple (file based URLs) and recursive (with...

SigFlip : A Tool For Patching Authenticode Signed PE Files

0
SigFlip is a tool for patching authenticode signed PE files (exe, dll, sys ..etc) in a way that doesn't affect or break the existing...

Reg1c1de : Registry Permission Scanner For Finding Potential Privesc Avenues Within Registry

0
Reg1c1de is a tool that scans specified registry hives and reports on any keys where the user has write permissions In addition, if any...

Dorkify : Perform Google Dork Search

0
Dorkify perform Google Dork Search. Google dorking is a hacker technique that uses Google Search to find security holes in the configuration and computer...

PSPKIAudit : PowerShell toolkit for auditing Active Directory Certificate Services (AD CS)

0
PSPKIAudit is a PowerShell toolkit for auditing Active Directory Certificate Services (AD CS). It is built on top of PKISolution's PSPKI toolkit (Microsoft Public License). This repo contains...

JWTXploiter : A Tool To Test Security Of Json Web Token

0
JWTXploiter is a tool to test security of JSON Web Tokens. Test a JWT against all known CVEs; Tamper with the token payload: changes claims...

Tko-Subs : A Tool That Can Help Detect And Takeover Subdomains With Dead DNS...

0
Tko-Subs allows: To check whether a subdomain can be taken over because it has:a dangling CNAME pointing to a CMS provider (Heroku, Github, Shopify, Amazon...

How to Improve your Remote Debugging Game for Java

0
Introduction Debugging is a significant part of programming. It contributes to improving the program output, locating code errors, finding the root cause of errors, etc....

Http-Request-Smuggling : HTTP Request Smuggling Detection Tool

0
Http-Request-Smuggling is a high severity vulnerability which is a technique where an attacker smuggles an ambiguous HTTP request to bypass security controls and gain...

TeamsUserEnum : User Enumeration With Microsoft Teams API

0
TeamsUserEnum, sometimes user enumeration could be sometimes useful during the reconnaissance of an assessment. This tool will determine if an email is registered on...

Recent Posts