Tuesday, June 15, 2021
Home Tags BeeBug

Tag: BeeBug

Must Need

Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...
Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM : The Ultimate WinRM Shell For Hacking/Pentesting

Evil WinRM is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implementation of WS-Management Protocol.
Webshell Analyzer : Web Shell Scanner & Analyzer

Webshell Analyzer : Web Shell Scanner & Analyzer

Webshell analyzer is a cross platform stand-alone binary built solely for the purpose of identifying, decoding, and tagging files that are suspected...
Reverse APK

Reverse APK – Quickly Analyze & Reverse Engineer Android Packages

Using Reverse APK you will have the option to quickly analyze and reverse engineer Android applications. FEATURES Of Reverse APK Displays all extracted files for...
vPrioritizer : Tool To Understand The Contextualized Risk (vPRisk)

vPrioritizer : Tool To Understand The Contextualized Risk (vPRisk)

As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry and it’s...
NetAss2 : Network Assessment Assistance Framework (PenTest Toolkit)

NetAss2 : Network Assessment Assistance Framework (PenTest Toolkit)

NetAss2 is a easier network scanning with NetAss2 (Network Assessment Assistance Framework). Make it easy for Pentester to do penetration testing on...
Lava : Large-scale Automated Vulnerability Addition

Lava : Large-scale Automated Vulnerability Addition

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has known bugs...