Friday, July 23, 2021
Home Tags Breaking hashes

Tag: breaking hashes

Must Need

ThreatIngestor  : Extract & Aggregate Threat Intelligence

ThreatIngestor : Extract & Aggregate Threat Intelligence

ThreatIngestor is an extendable tool to extract and aggregate IOCs from threat feeds. Integrates out-of-the-box with ThreatKB and MISP, and...
Spiderfoot : The Most Complete OSINT Collection & Reconnaissance Tool

Spiderfoot : The Most Complete OSINT Collection & Reconnaissance Tool

SpiderFoot is an open source intelligence (OSINT) automation tool. Its goal is to automate the process of gathering intelligence about a given...
NoSQLMap : Automated NoSQL Database Enumeration & Web Application Exploitation Tool

NoSQLMap : Automated NoSQL Database Enumeration & Web Application Exploitation Tool

NoSQLMap is an open source Python tool designed to audit for as well as automate injection attacks and exploit default configuration weaknesses...
ScareCrow : Payload Creation Framework Designed Around EDR Bypass

ScareCrow : Payload Creation Framework Designed Around EDR Bypass

ScareCrow is a payload creation framework for generating loaders for the use of side loading (not injection) into a legitimate Windows process...

Dirhunt – Find Web Directories Without Bruteforce

Dirhunt is a web crawler optimize for search and analyze directories. This tool can find interesting things if the server has the "index of"...
XXExploiter : Tool To Help Exploit XXE Vulnerabilities

XXExploiter : Tool To Help Exploit XXE Vulnerabilities

XXExploiter is a tool to help exploit XXE vulnerabilities. They wrote this tool to help me testing XXE vulnerabilities. It generates the...
iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For iOS Applications

iOS Malicious Bit Hunter : A Malicious Plug-In Detection Engine For...

iOS Malicious Bit Hunter is a malicious plug-in detection engine for iOS applications. It can analyze the head of the macho file...