Sunday, July 5, 2020
Home Tags AT

Tag: AT

Must Need

Metabigor : Command Line Search Engines Without Any API Key

Metabigor : Command Line Search Engines Without Any API Key

Metabigor allows you do query from command line to awesome Search Engines (like Shodan, Censys, Fofa, etc) without any API key.
XCTR Hacking Tools 2020

XCTR Hacking Tools 2020

XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is...
Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...
Scanner CLI

Scanner CLI : A Project Security/Vulnerability/Risk Scanning Tool

The Hawkeye Scanner CLI is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your...
BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack

BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC...

BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. It can work with any...
CVE-API : Unofficial API for CVE.MITRE.ORG

CVE-API : Unofficial API for CVE.MITRE.ORG

CVE Api is a parse & filter the latest CVEs from cve.mitre.org. Usage http://localhost:4000/cve?target=KEYWORD
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...