Tuesday, July 17, 2018
Home SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-4

sqlmap2-4

sqlmap

Tables Populating

sqlmap
sqlmap

Must Need

SIEM

SIEM – A Beginner’s Guide to Security Information and Event Management...

What is a SIEM? SIEM, when expanded, becomes Security Information Event Management. As its name suggests,  the main function of a SIEM is Event management....
Gcat

Gcat – Sneaking Backdoor Use Gmail As A Command &...

Gcat is a stealthy Python based backdoor that uses Gmail as a command and control server. This project was inspired by the original PoC...
Linset

Linset : Hack WPA WPA2 Using This Tool

Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served to me to be...
Fragroute

Fragroute – A Network Packet Fragmentation & Firewall Testing Tool

Fragroute intercepts,  modifies and rewrites egress traffic destined for the specified host. Simply frag route fragments packets originating from our(attacker) system to the destination...
Dejavu

Dejavu – Open Source Deception Framework

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...
Hooker

Hooker : Automated Dynamic Analysis of Android Applications

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...