Tuesday, June 15, 2021
Home Tags Auto Exploiter

Tag: Auto Exploiter

Must Need

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force

Lazy-RDP : Script For AutomRDPatic Scanning And Brute-Force

Lazy-RDP is a Script for automatic scanning of the address list for the presence of open 3389 ports, and then selecting the...
DVNA : Damn Vulnerable NodeJS Application

DVNA : Damn Vulnerable NodeJS Application

Damn Vulnerable NodeJS Application (DVNA) is a simple NodeJS application to demonstrate OWASP Top 10 Vulnerabilities and guide on fixing and avoiding...
WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot : A WiFi Pentest Cracking tool for WPA/WPA2

WiFiBroot is a WiFi-Penetest-Cracking tool for WPA/WPA2 (Handshake, PMKID, Offline Cracking, EAPOLS, Deauthentication Attack). It is built to provide...
Osintgram – A OSINT Tool On Instagram

Osintgram – A OSINT Tool On Instagram

Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by...
ArmourBird CSF – Container Security Framework

ArmourBird CSF – Container Security Framework

ArmourBird CSF - Container Security Framework is an extensible, modular, API-first framework build for regular security monitoring of docker installations and containers against...
ABPTTS : TCP Tunneling Over HTTP/HTTPS For Web Application Servers

ABPTTS : TCP Tunneling Over HTTP/HTTPS For Web Application Servers

ABPTTS uses a Python client script and a web application server page/package to tunnel TCP traffic over an HTTP/HTTPS connection to a...