Saturday, July 24, 2021
Home Tags Bluelog

Tag: bluelog

bluelog

Bluelog

Must Need

Wordlist-Generator : Unique Wordlist Generator Of Unique Wordlists

Wordlist-Generator : Unique Wordlist Generator Of Unique Wordlists

Wordlist-Generator generates wordlists with unique words with techniques mentioned in tomnomnom's report "Who, What, Where, When". It takes URLs from gau and...
Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban scans log files like /var/log/auth.log and bans IP addresses conducting too many failed login attempts. It does this by updating system firewall rules...
Pineapple MK7 REST Client : WiFi Hacking Workflow With Pineapple Mark 7 API

Pineapple MK7 REST Client : WiFi Hacking Workflow With Pineapple Mark...

PINEAPPLE MK7 REST CLIENT is a leading rogue access point and WiFi pentest toolkit for close access operations. It is also a...

Hardening up Your Cyber Defence With Risk Assessment

Your company faces an array of cyber threats, which are both internal and external. Cybersecurity risk assessment is meant to identify, assess, and implement security...
Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...
DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
UserRecon-PY : Find Username In Social Networks

UserRecon-PY : Find Username In Social Networks

Userrecon-PY is a tool used to find usernames in social networks. Installation Install...