Tuesday, June 2, 2020
Home SQLMAP –¬†Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-5

sqlmap2-5

sqlmap

Tables Populating

sqlmap
sqlmap

Must Need

DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the Github Repositories

DumpTheGit : Public Repositories to Find Sensitive Information Uploaded to the...

DumpTheGit searches through public repositories to find sensitive information uploaded to the Github repositories. The tool will flag the...
Goop : Google Search Scraper

Goop : Google Search Scraper

Goop can perform google searches without being blocked by the CAPTCHA or hitting any rate limits. How it...
Getsploit

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature...
Fuzzowski : The Network Protocol Fuzzer

Fuzzowski : The Network Protocol Fuzzer

The idea is to be the Network Protocol Fuzzer that we will want to use. The aim of this tool is...
BadBlood : Microsoft Active Directory Domain With A Structure

BadBlood : Microsoft Active Directory Domain With A Structure

BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool...
Minimalistic Offensive Security Tools

Minimalistic Offensive Security Tools

Minimalistic is a simple SMB login attack and password spraying tool. It takes a list of targets and...
Penta : Open Source All-In-One CLI Tool To Automate Pentesting

Penta : Open Source All-In-One CLI Tool To Automate Pentesting

Penta is is Pentest automation tool using Python3. It provides advanced features such as metasploit and nexpose to extract vuln info...