Tuesday, July 27, 2021
Home Tags AD

Tag: AD

Must Need

Glances : Top/htop Alternative For GNU/Linux, BSD, Mac OS & Windows OS

Glances : Top/htop Alternative For GNU/Linux, BSD, Mac OS & Windows...

Glances is a cross-platform monitoring tool which aims to present a large amount of monitoring information through a curses or Web based interface....
Joomscan

Joomscan – OWASP Joomla Vulnerability Scanner Project

OWASP Joomla! Vulnerability ScannerĀ  or JoomScan is an open source project, developed with the aim of automating the task of vulnerability detection and reliability...
10minutemail : Python Temporary Email

10minutemail : Python Temporary Email

10minutemail.net is a free, disposable e-mail service. Your temporary e-mail address will expire after 10 minutes, after which you cannot access it....
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
AutoRDPwn : The Shadow Attack Framework

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature...

Docker Tor Hidden Service Nginx – Easily Setup A Hidden Service...

Docker tor hidden service nginx is a tool to easily setup a hidden service inside the Tor network. Generate the skeleton configuration for you hidden...