Wednesday, April 8, 2020
Home Tags Blackowl

Tag: Blackowl

Must Need

B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis

B2R2 : A Collection of Algorithms, Functions And Tools For Binary...

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis written purely in F# (in .NET lingo, it is...
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

NekoBot : Auto Exploiter With 500+ Exploit 2000+ Shell

NekoBot is an auto exploit tool to facilitate the penetration of one or many websites (Wordpress, Joomla, Drupal, Magento, Opencart,and Etc).
Frisky

Frisky – Tools To Assist Binary App Reversing & Augmentation

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...
Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 : To Find Vulnerabilities In AD Group Policy

Grouper2 is a tool to find vulnerabilities in AD group policy. It is a tool for pentesters to help find security-related misconfigurations...

Social10x Review

Being Instagram famous takes more than just posting a few images on Instagram and taking the credit - you have to do more. It involves...