Tuesday, September 17, 2019
Home Tags Bug Bounty

Tag: Bug Bounty

Must Need

Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python...

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an...
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
ImaginaryC2

ImaginaryC2:Python Tool Help In Network Behavioral Analysis Of Malware

ImaginaryC2 is a python tool which aims to help in the behavioral (network) analysis of malware. It hosts a HTTP server which...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
PcapXray : Tool To Visualize A Packet Capture Offline

PcapXray : Tool To Visualize A Packet Capture Offline

PcapXray is a Network Forensics Tool to visualize a Packet Capture offline as a Network Diagram including device identification, highlight important communication...
Ehtools : Penetration Tools That Can Be Explored Easily

Ehtools : Penetration Tools That Can Be Explored Easily

Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework is a framework of serious penetration tools that...

Sliver : Implant Framework

Sliver is a general purpose cross-platform implant framework that supports C2 over Mutual-TLS, HTTP(S), and DNS. Implants are dynamically compiled...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout