Php_Code_Analysis : Scan your PHP code for vulnerabilities

0

Php_Code_Analysis is a tool to Scan your PHP code for vulnerabilities the script can find check_file_upload issueshost_header_injectionSQl injectioninsecure deserializationopen_redirectSSRFXSSLFIcommand_injection Features fastsimple report Usage python code.py >>> this will scan one filepython code.py >>> this will scan full folder (.)python code.py >>> scan full folder Output Download

Solr-GRAB : Steal Apache Solr Instance Queries With Or Without A Username And Password

0

Solr-GRAB is a tool to Steal Apache Solr instance Queries with or without a username and password. Note : This project should be used for authorized testing and educational purposes only. Download git clone https://github.com/GnosticPlayers/Solr-GRAB Usage You can search for Apache Solr Instances via Censys, with the dork "Welcome To Solr" or "Apache Solr Admin". To grab queries, simply go to the http access point, sometimes being...

CiLocks : Android LockScreen Bypass

0

CiLocks (Crack Interface lockscreen), Metasploit and More Android Hacking. Update Available V1.1.0  Added New Tools Root Android {Supersu} Not Support All OS Version Jump To Adb Toolkit Remove Lockscreen {Root} Jump To Metasploit Restore All Media Deleted (Coomingsoon) Brute Pin 4 Digit Brute Pin 6 Digit Brute LockScreen Using Wordlist Bypass LockScreen {Antiguard} Not Support All OS Version Reset Data Screenshot Required ADB {Android SDk}USB CableAndroid Emulator {Nethunter/Termux} RootOr Computer Installation For Linux git clone https://github.com/tegal1337/CiLockscd...

MurMurHash : Tool To Calculate A MurmurHash Value Of A Favicon To Hunt Phishing Websites On The Shodan Platform

0

MurMurHash is a tool used to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform. What Is MurMurHash? MurmurHash is a non-cryptographic hash function suitable for general hash-based lookup. The name comes from two basic operations, multiply (MU) and rotate (R), used in its inner loop. The current version is MurmurHash3 which yields a 32-bit...

AMSITrigger : The Hunt For Malicious Strings

0

AMSITrigger will identify all of the malicious strings in a powershell file, by repeatedly making calls to AMSI using AMSIScanBuffer . Hunting For Malicious Strings Usage -i, --inputfile=VALUE Powershell filename-u, --url=VALUE URL eg. https://10.1.1.1/Invoke-NinjaCopy.ps1-f, --format=VALUE Output Format:1 - Only show Triggers2 - Show Triggers with Line numbers3 - Show Triggers inline with code4 - Show AMSI calls (xmas tree mode)-d, --debug Show...

Charlotte : C++ Fully Undetected Shellcode Launcher

0

Charlotte is an c++ fully undetected shellcode launcher . Description 13/05/2021:c++ shellcode launcher, fully undetected 0/26 as of 13th May 2021.dynamic invoking of win32 api functionsXOR encryption of shellcode and function namesrandomised XOR keys and variables per runon Kali Linux, simply 'apt-get install mingw-w64*' and thats it!17/05/2021:random strings length and XOR keys length Antiscan.me Usage git clone the repository, generate your shellcode file with...

GraphQLmap : A Scripting Engine To Interact With A Graphql Endpoint For Pentesting Purposes

0

GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. Install $ git clone https://github.com/swisskyrepo/GraphQLmap$ python graphqlmap.py_/ | | | / _ | | | | _ _ _ _ _ _ | |_ | | | | | _ _ _ _ _ _ | | | | '/ | '_ | '_ | | |...

Here’s What the Best Online Coding Classes Have Going for Them

0

In the last few years, online coding classes have become a common activity for parents everywhere to book for their children. Not only are the sessions fun, but they teach kids skills they’ll need in the classroom and workforce of the future. Before signing up your child for sessions, it’s crucial to know how to recognize the best programs from...

DivideAndScan : Divide Full Port Scan Results And Use It For Targeted Nmap Runs

0

DivideAndScan is used to efficiently automate port scanning routine by splitting it into 3 phases: Discover open ports for a bunch of targets.Run Nmap individually for each target with version grabbing and NSE actions.Merge the results into a single Nmap report (different formats available). For the 1st phase a fast port scanner is intended to be used (Masscan / RustScan / Naabu), whose output is parsed and...

Endpoint Detection and Response: 6 Best Practices You Must Know About

0

What Is Endpoint Detection and Response? An endpoint detection and response (EDR) solution is a collection of tools and processes used to detect and analyze potential attacks and their traces on endpoint devices. Endpoints include desktops, laptops, mobile devices, and other devices connected to a corporate network.  EDR solutions are designed to provide continuous monitoring and response to cyber threats and...