Thursday, June 27, 2019
Home Tags AWS

Tag: AWS

Must Need

DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
XAttacker

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website...
Rootless Jailbreakd

Rootless Jailbreakd – Jailbreakd Offering Some More Functionality To The Jailbreak

Rootless Jailbreakd is A small jailbreakd offering some more functionality to the jailbreak. Uses CPDisctributedMessageCenter. To compile you need theos (why? cus why not?...
PacBot : Platform For Continuous Compliance & Security Automation For The Cloud

PacBot : Platform For Continuous Compliance & Security Automation For The...

PacBot is a platform for continuous compliance monitoring, compliance reporting and security automation for the cloud. In PacBot, security and compliance...
PhoneSploit : Using Open ADB Ports We Can Exploit A Android Device

PhoneSploit : Using Open ADB Ports We Can Exploit A Android...

PhoneSploit is using open Adb ports we can exploit a Android Device. You can find open ports by clicking here.
Linset

Linset : Hack WPA WPA2 Using This Tool

Linset Is Not a Social Engineering Tool. Most importantly, remarked this is a task for instructive purposes that have served to me to be...
Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir is a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting.