Saturday, September 21, 2019
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-12

sqlmap2-12

sqlmap

List of Privileges for root user

sqlmap
sqlmap

Must Need

wpcrack

WpCrack – Simple Tool For Brute Force WordPress

Wpcrack is simple tool for brute force Wordpress. It was made by ZoneSec team, using python language. Installation WpCrack git clone https://github.com/MrSqar-Ye/wpCrack.git Also Read CSS Keylogger – Chrome...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
RedGhost : Linux Post Exploitation Framework

RedGhost : Linux Post Exploitation Framework

RedGhost is the Linux post exploitation framework designed to assist red teams in persistence, reconnaissance, privilege escalation and leaving no trace.
Peda

Peda – Python Exploit Development Assistance for GDB

PEDA is a python exploit development assistance for GDB. Features Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. ...
SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management...

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a SIEM is Event management....
Miasm

Miasm – Reverse Engineering Framework In Python

Miasm is a free and open source (GPLv2) reverse engineering framework. Miasm aims to analyze / modify / generate binary programs. Here is a...
Sh00t

Sh00t : A Testing Environment for Manual Security Testers

Sh00t is a testing environment for manual security testers. Security Testing is not as simple as right click > Scan. It's messy,...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout