Spyse : Python API Wrapper & Command-Line Client For The Tools Hosted On Spyse.com

0

Spyse is a developer of complete DAAS (Data-As-A-Service) solutions for Internet security professionals, corporate and remote system administrators, SSL / TLS encryption certificate providers, data centers and business analysts. All Spyse online solutions are represented by thematic services that have a single platform for collecting, processing and aggregating information. Supports the following APIs: DNStableFindSubdomainsCertDBASlookupPortMapDomainsDB Python API wrapper and command-line client for the...

Windows Linux Kernel Is Now Available Via WSL 2

0

At the point when Microsoft first reported bash on Windows and brought Linux inside Windows as Windows Subsystem for Linux or WSL, few would have imagined that the following stage brings the genuine Linux piece inside Windows working framework. Truly, what we expected was right, Microsoft just released another Windows 10 Insider Preview build, highlighting the Windows Subsystem for...

PTF : A Way For Modular Support For Up-To-Date Tools

0

PTF( PenTesters Framework) is a Python script designed for Debian/Ubuntu/ArchLinux based distributions to create a similar and familiar distribution for Penetration Testing. As pentesters, we've been accustom to the /pentest/ directories or our own toolsets that we want to keep up-to-date all of the time. We have those "go to" tools that we use on a regular basis, and...

Scapy : Python-Based Interactive Packet Manipulation Program & Library

0

Scapy is a powerful Python-based interactive packet manipulation program and library. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, store or read them using pcap files, match requests and replies, and much more. It is designed to allow fast packet prototyping by using default values that work. It...

Best Way to Learn Programming Online If You’re Tired of Books and Tutors

0

Today programming is taking the reins of the world's labor market. Ever developing, much promising and forward-looking, it's really worthwhile learning and implementing.  Coding brings voluminous profit in business, so every company prefers hiring those candidates who are well aware of the programming world with its burning innovations. However, many students feel like programming is something beyond their reach – even...

TwitterShadowBanV2 : Twitter Shadowban Tests

0

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the usual babel magic. git clone https://github.com/shadowban-eu/TwitterShadowBanV2 && cd TwitterShadowBanV2 npm install Since we are using a php backend for request proxying, you will also need PHP. The gulp script uses php-cli's webserver. Debian apt-get install php7.2-cli Finally, use the default gulp task to start...

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

0

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised system to move around inside a network. It is a Standalone Utility, Which can use as a Server or as a Client. PivotSuite as a Server : If the compromised host is directly accessible (Forward Connection) from Our pentest...

Lynis : Security Auditing Tool for Unix/Linux Systems

0

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security scan. Software packages is available by clicking here. Requirements Shell and basic utilities Permissions Normal user or preferable root permissions Installation Installation via package Installing the tool via a package manager is one option to get started with it. For most operating systems and...

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

0

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of the same vulnerability. The exploitation enables slow data siphon from a database (currently supports MySQL/MariaDB only) using bitwise operation on printable ASCII characters, via a blind-SQL injection. For interoperability with other Python tools and to enable other users utilise...

Ponce : IDA Pro Plugin That Provides Users The Ability To Perform Taint Analysis & Symbolic Execution

0

Ponce is an IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in an easy and intuitive fashion. With Ponce you are one click away from getting all the power from cutting edge symbolic execution. Entirely written in C/C++. Symbolic execution is not a new concept in the security community....