Saturday, September 21, 2019
Home SQLMAP –¬†Enumeration of Databases & Users from Vulnerable Web Forms sqlmap2-9

sqlmap2-9

sqlmap

Enumerating Users

sqlmap
sqlmap

Must Need

Burp Extensions – Burp Suite Extensions For The New Burp Suite...

Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add...
PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...
BLEAH

BLEAH – A BLE Scanner For SMART Devices Hacking

BLEAH is a BLE scanner for SMART devices hacking based on the bluepy library, dead easy to use because retarded devices should be dead...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
Evilginx2

Evilginx2 : Standalone Man-In-The-Middle Attack Framework

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to...
Adidnsdump : Active Directory Integrated DNS Dump Tool

Adidnsdump : Active Directory Integrated DNS Dump Tool

Adidnsdump tool is an Active Directory Integrated DNS dumping by any authenticated user. By default any user in...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout