Saturday, June 6, 2020
Home Tags Chrome

Tag: Chrome

Must Need

RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256. Usage Usage:...
The Student’s Guide to Cyber Security – 9 Top Tips to Prevent Yourself From Hackers

The Student’s Guide to Cyber Security – 9 Top Tips to...

The rise of the Internet has brought tremendous benefits to people’s education. But, it also makes people targets to hackers and theft...
0xsp Mongoose : Linux Privilege Escalation Intelligent Enumeration Toolkit

0xsp Mongoose : Linux Privilege Escalation Intelligent Enumeration Toolkit

Using 0xsp Mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting...
MalwareCMDMonitor

MalwareCMDMonitor – Shows Command Lines Used By Latest Instances Analyzed On...

By using MalwareCMDMonitor python script, you can observe the commands of the latest malware instances executed on hybrid-analysis.com sandbox. In a nutshell, it downloads...
HoneyBot : Capture, Upload & Analyze Network Traffic

HoneyBot : Capture, Upload & Analyze Network Traffic

HoneyBot is a set of scripts and libraries for capturing and analyzing packet captures with PacketTotal.com. Currently this library provides three scripts:
Parameth

Parameth : Tool Used To Brute Discover GET & POST Parameters

Parameth tool can be used to brute discover GET and POST parameters. Often when you are busting a directory for common files,...
Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation Tasks

Flare-Emu : Easy To Use And Flexible Interface For Scripting Emulation...

Flare-emu marries IDA Pro’s binary analysis capabilities with Unicorn’s emulation framework to provide the user with an easy to use and flexible...