Applications You Can Build with Free APIs

0

With free APIs, developers can practice programming by using those APIs to create applications. Once you have practiced writing apps, you can then move on to paying for some APIs that you can use to write even more useful or complex apps. Phone Number Validator There is a multitude of free APIs that are available to the public. So, your options...

FinDOM-XSS : A Fast DOM Based XSS Vulnerability Scanner With Simplicity

0

FinDOM-XSS is a tool that allows you to finding for possible and/ potential DOM based XSS vulnerability in a fast manner. Installation $ git clone https://github.com/dwisiswant0/findom-xss.git Dependencies: LinkFinder Configuration Change the value of LINKFINDER variable (on line 3) with your main LinkFinder file. Usage To run the tool on a target, just use the following command. $ ./findom-xss.sh https://target.host/about-us.html This will run the tool against target.host. URLs...

ParamSpider : Mining Parameters From Dark Corners Of Web Archives

0

ParamSpider is a mining parameters from dark corners of web archives. Features Finds parameters from web archives of the entered domain.Finds parameters from subdomains as well.Gives support to exclude urls with specific extensions.Saves the output result in a nice and clean manner.It mines the parameters from web archives (without interacting with the target host) Usage Note : Use python 3.7+ $ git clone https://github.com/devanshbatham/ParamSpider$...

GIVINGSTORM : Infection Vector That Bypasses AV, IDS, & IPS

0

GIVINGSTORM is a breeze to use. Simply clone the directory, and cd into it. The beginnings of a C2 framework. Currently without all the C2 stuff so far. Generates a dual stage VBS infection vector, and a dual stage HTA infection vector. The variables take into account C2 addresses, Koadic/Empire payloads, and a few delivery mechanisms. The payload files...

Debotnet : Tool For Controlling Windows 10’s Privacy-Related Settings

0

Debotnet is a free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private. Your preparation for the Net! The Windows 10 default privacy settings leave a lot to be desired when it comes to protecting you and your private information. Whenever I set up a new computer or update a current setup for my...

OWASP Threat Dragon Desktop

0

Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations. It is an OWASP Incubator Project. The focus of the project is on great UX, a powerful rule engine and integration with other development lifecycle tools. There is a good overview of threat modeling and risk assessment from OWASP, and...

Cloudtopolis : Cracking Hashes In The Cloud For Free

0

Cloudtopolis is a tool that facilitates the installation and provisioning of Hashtopolis on the Google Cloud Shell platform, quickly and completely unattended (and also, free!). Requirements Have 1 Google account (at least). Installation Cloudtopolis installation is carried out in two phases: Phase 1 Access Google Cloud Shell from the following link: https://ssh.cloud.google.com/cloudshell/editor?hl=es&fromcloudshell=true&shellonly=true Then, run the following commands inside this terminal: wget https://raw.githubusercontent.com/JoelGMSec/Cloudtopolis/master/Cloudtopolis.sh chmod +x Cloudtopolis.sh ./Cloudtopolis.sh Phase 2 Access...

Colabcat – Running Hashcat On Google Colab With Session Backup And Restore

0

Colabcat is a tool used to run hashcat on Google colab with session backup and restore. Usage Go to the link below to open a copy of the colabcat.ipynb file in Google Colab: https://colab.research.google.com/github/someshkar/colabcat/blob/master/colabcat.ipynbClick on Runtime, Change runtime type, and set Hardware accelerator to GPU.Go to your Google Drive and create a directory called dothashcat, with a hashes subdirectory where you...

CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner

0

A CorsMe misconfiguration scanner tool based on golang with speed and precision in mind ! Misconfiguration type this scanner can check for Reflect Origin checksPrefix MatchSuffix MatchNot Esacped DotsNullThirdParties (Like => github.io, repl.it etc.)Taken from Chenjj's github repoSpecialChars (Like => "}","(", etc.)See more in Advanced CORS Exploitation Techniques How to Install? $ go get -u github.com/shivangx01b/CorsMe Usage Single Url echo "https://example.com" | ./CorsMe Multiple...

Sifter : OSINT, Recon & Vulnerability Scanner

0

Sifter is a osint, recon & vulnerability scanner. It combines a plethara of tools within different module sets in order to quickly perform recon tasks, check network firewall, enumerate remote and local hosts, and scan for the 'blue' vulnerabilities within microsft and if unpatched, exploit them. It uses tools like blackwidow and konan for webdir enumeration and attack surface...