Tuesday, July 17, 2018
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-1

sqlmap2-1

sqlmap

Performing DB Enumeration

sqlmap

Must Need

Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development...

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools...
Pemcracker

Pemcracker – Tool to crack encrypted PEM files

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to...
OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
Frisky

Frisky – Tools To Assist Binary App Reversing & Augmentation

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...

Burpsuite – Use Burp Intruder to Bruteforce Forms

Using Burp Intruder to Bruteforce passwords. Burpsuite is a collection of tools and plugins for any web application security testing bundled into a single executable...