Tuesday, July 17, 2018
Home SQLMAP – Introduction & Automation of SQLi sqlmap8

sqlmap8

sqlmap

Saving the file

sqlmap
sqlmap

Must Need

Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java-scripts & shell-codes. It...
dnsniff macof

macof

MAC Flooding with MACOF & some major countermeasures Macof is a member of the Dsniff suit toolset and mainly used to flood the switch on...
sawef

SAWEF – Send Attack Web Forms

The motivation behind this SAWEF tool is to be a Swiss armed force cut for any individual who works with HTTP, so far it,...
RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...
chntpw

chntpw – Windows Password, Account Forensics & Change User Password

chntpw is a Kali Linux tool that can be used to edit the windows registry, reset a users password, and promote a user to...
lbd

lbd – Tool to Detect Whether a Domain has Load Balancing...

Load balancing(lbd) is the technique used in different services for balancing the load across different servers or NICs. It can be in any form....