Friday, December 13, 2019
Home Stagefright – All you need to know stagefright4

stagefright4

stagefright

Scanning using Lookout Securtiy App

stagefright
stagefright

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
bluelog

Bluelog

Simple Bluetooth Discovery with Bluelog Bluelog is a simple Bluetooth scanner that is designed to essentially do just one thing, log all the discoverable devices...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason why you’ll experience identity...
Telewreck

Telewreck – A Burp Extension To Detect And Exploit CVE-2017-9248

Telewreck is a Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248. Telewreck Attribute Detect vulnerable versions of Telerik Web...
PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

PwnedOrNot : OSINT Tool To Find Passwords For Compromised Email Addresses

pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Haveibeenpwned offers a lot of information about the compromised email,...
HashCatch : Capture Handshakes Of Nearby WiFi Networks Automatically

HashCatch : Capture Handshakes Of Nearby WiFi Networks Automatically

Hashcatch deauthenticates clients connected to all nearby WiFi networks and tries to capture the handshakes. It can be used in any Linux...
Netdata

NetData : Real-time Performance Monitoring Tool

Netdata is distributed, real-time, performance and health monitoring for systems and applications. It is a highly optimized monitoring agent you install on...