Friday, July 23, 2021
Home Tags Browser Exploitation

Tag: Browser Exploitation

Must Need

Ventoy : A New Bootable USB Solution

Ventoy : A New Bootable USB Solution

Ventoy is an open source tool to create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI files.With ventoy, you don't need to format the disk...
PhoneInfoga : Advanced Information Gathering & OSINT Tool For Phone Numbers

PhoneInfoga : Advanced Information Gathering & OSINT Tool For Phone Numbers

PhoneInfoga is one of the most advanced tools to scan phone numbers using only free resources. The goal is to first gather...
Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
BlueCloud : Cyber Range including Velociraptor + HELK system with a Windows VM for security testing and R&D

BlueCloud : Cyber Range including Velociraptor + HELK system with a...

BlueCloud , a Cyber Range deployment of HELK and Velociraptor! Automated terraform deployment of one system running HELK + Velociraptor server with...
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec : An Open Source Tool That Improves Identification Of Vulnerabilities

Horusec is an open source tool that performs static code analysis to identify security flaws during the development process. Currently, the languages...
Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator : The Python Password-Protected Obfuscator

Ghostfuscator is a obfuscate python scripts making them password-protected using AES Encryption. Usage Just execute...