Monday, June 21, 2021
Home Tags Application control policy

Tag: application control policy

Must Need

Recox : Master Script For Web Reconnaissance

Recox : Master Script For Web Reconnaissance

The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other than OWASP...
havij

Havij Download – Advanced Automated SQL Injection Tool

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely...
GDA Android Reversing Tool

GDA Android Reversing Tool

Here, a new Dalvik bytecode decompiler, GDA(this project started in 2013 and released its first version 1.0 in 2015 at www.gda.wiki:9090) ...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
Is Kia Sportage Malaysia The Best SUV 2021

Is Kia Sportage Malaysia The Best SUV 2021

In Malaysia, Kia Sportage is offered in only two variants; Kia Sportage 2.0 EX at RM 123,480 and Kia Sportage 2.0D GT-LINE...
Pulsar : Network Footprint Scanner Platform

Pulsar : Network Footprint Scanner Platform

Pulsar is an automated network footprint scanner for Red Teams, Pentesters and Bounty Hunters. Its focused on discovery of organization public facing...
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are...