Wednesday, April 1, 2020
Home Tags Blackbone

Tag: Blackbone

Must Need

ScanQLi – To Detect SQL Vulns

ScanQLi – To Detect SQL Vulns

ScanQLi is a simple SQL injection scanner with somes additional features. This tool can't exploit the SQLi, it just detect them. Tested...
CuckooDroid

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox

CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of...
SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...
Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have a look...
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )
Re2Pcap : Create PCAP file From Raw HTTP Request Or Response In Seconds

Re2Pcap : Create PCAP file From Raw HTTP Request Or Response...

Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using it and test them against Snort...