Tuesday, December 10, 2019
Home Tags Bluelog

Tag: bluelog

bluelog

Bluelog

Must Need

Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap automates a normal &...
TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java-scripts & shell-codes. It...
Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
ReverseAPK

ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications

Now and then, you may have a circumstance to figure out your current APKs for legitimate analysis investigation reasons, for example, making queries on...
Darling

Darling – Darwin/Mac OS Emulation Layer For Linux

Darling is a runtime environment for OS X applications. Please note that no GUI applications are supported at the moment. Download Darling Darling uses many Git...
Java-Stager

Java-Stager : A PoC To Download, Compile & Execute A Java...

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk for me are: Load a...