Tuesday, July 27, 2021
Home Tags Bug Bounty Program

Tag: Bug Bounty Program

Must Need

Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Terraform AWS Secure Baseline :  To Set Up Your AWS Account

Terraform AWS Secure Baseline : To Set Up Your AWS...

Terraform Aws Secure Baseline is a terraform module to set up your AWS account with the secure baseline configuration based on CIS...
What is DNS Filtering and How to Use It for Safe Browsing

What is DNS Filtering and How to Use It for Safe...

In the simplest terms, Domain Name System (DNS) filtering is a method by which users of home, school, and work computers and...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
TeleShadow3 : Telegram Desktop Session Stealer (Windows)

TeleShadow3 : Telegram Desktop Session Stealer (Windows)

Teleshadow3 is a advanced Telegram desktop session hijacker for windows, you can download tool by clickin here. Set the email and...
InstaSave : Python Script To Download Images, Videos & Profile Pictures From Instagram

InstaSave : Python Script To Download Images, Videos & Profile Pictures...

InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.