Wednesday, July 8, 2020
Home Tags Bluetooth device

Tag: bluetooth device

bluelog

Bluelog

Must Need

BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox : Tool To Perform Penetration Tests & Security Assessments

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.
LeakLooker

LeakLooker : Find open databases with Shodan

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results from Shodan,...
Passwordless Authentication

Passwordless Authentication Should Become Mainstream by 2022

Since the days of Ancient Rome and Egypt, people have used passwords to authenticate and grant access. Nowadays, passwords are more common than ever....
RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces

RMIScout : Bruteforce Attacks Against Exposed Java RMI Interfaces

RMIScout performs wordlist and bruteforce attacks against exposed Java RMI interfaces to safely guess method signatures without invocation. On...
Winspy

Winspy – Windows Reverse Shell Backdoor Creator With An Automatic IP...

WinSpy a Windows reverse shell Backdoor creator with an Automatic IP Poisene. Dependencies metasploit-framework xterm apache2 Also ReadEvilginx2 – Standalone MITM Attack Framework Used For...
DNSteal : DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests

DNSteal : DNS Exfiltration Tool For Stealthily Sending Files Over DNS...

DNSteal is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below are...
Password Lense: Reveal Character Types In A Password

Password Lense: Reveal Character Types In A Password

Certain characters in passwords ('O' and '0', 'I' and 'l', etc.) can be hard to identify when you need to type them...