Saturday, May 18, 2024
EHA
Home Search

vulnerable - search results

If you're not happy with the results, please do another search

Raptor WAF – Web application firewall using DFA

0
Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...

RouterSploit – Exploitation Framework For Embedded Devices

0
Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...

Hcxdumptool – Small Tool To Capture Packets From WLAN Devices

0
Hcxdumptool is small tool to capture packets from wlan devices. After capturing, upload the "uncleaned" cap here to see if your application or the...

Firebase – Tool To Exploiting Misconfigured Firebase Databases

0
Firebase exploiting tool is exploiting misconfigured firebase databases. Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

0
XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

0
CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing SPNs Accounts

0
RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

0
Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

0
CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...

Havij Download – Advanced Automated SQL Injection Tool

0
Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely...

Recent Posts