Wednesday, January 22, 2020
Home Tags Catnip

Tag: Catnip

Must Need

JCS

JCS – Joomla Vulnerability For Penetration Testing Component Scanner

JCS (Joomla Component Scanner) made for penetration testing purpose on Joomla CMS JCS can help you with the latest component vulnerabilities and exploits. Database...
Hacking Books PDF

Best Free Hacking Books PDF Related To Security and Pentesting

E-books security is an articulation that was made when the term digital book was first utilized, possibly around 1999. Here is the list of...
SOC Program

What to Look for in the Right SOC Program – A...

SOC stands for "security operations center", and it's important to every business, no matter what it's size. It doesn’t matter how...
Secretx : Extracting API keys & Secrets By Requesting Each URL At The Your List

Secretx : Extracting API keys & Secrets By Requesting Each URL...

Secretx is a tool which is mainly used for extracting api keys and secrets by requesting each url at the your list....
AutoRDPwn

AutoRDPwn – The Shadow Attack Framework

AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker...
Sooty : The SOC Analysts All-In-One CLI Tool To Automate & Speed Up Workflow

Sooty : The SOC Analysts All-In-One CLI Tool To Automate &...

Sooty is a tool developed with the task of aiding SOC analysts with automating part of their workflow. One of the...
RFI/LFI : Local/Remote File Inclusion

RFI/LFI : Local/Remote File Inclusion

Let us take a look at the RFI/LFI payload list. As with many exploits, remote and local file inclusions are only a...