Wednesday, September 18, 2019
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-13



Enumerating Roles


Must Need


MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...
Scavenger : Crawler (Bot) Searching For Credential Leaks On Different Paste Sites

Scavenger : Crawler (Bot) Searching For Credential Leaks On Different Paste...

Scavenger crawler (Bot) searching for credential leaks on different paste sites. Just the code of my OSINT bot searching for sensitive data...

WMD – Weapon of Mass Destruction

WMD is a python tool with an accumulation of IT security software. The product is incapsulated in "modules". The modules consists of unadulterated python...

WAF-Buster : Disrupt WAF by abusing SSL/TLS Ciphers

WAF-buster tool was created to Analyze the ciphers that are supported by the Web application firewall being used at the web server end. It...

Mallet – A Framework For Creating Proxies

Mallet is a tool for creating proxies for arbitrary protocols, along similar lines to the familiar intercepting web proxies, just more generic. It is built...

W12Scan : A Simple Asset Discovery Engine for Cybersecurity

W12Scan is a network asset discovery engine that can automatically aggregates related assets for analysis and use. W12scan is also my...

Shopping cart

Shipping and discount codes are added at checkout.