Friday, August 23, 2019
Home Tags Chrome

Tag: Chrome

Must Need

GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
Pentol

PENTOL – Pentester Toolkit for Fiddler2 2018

PENTOL is a pentester Toolkit is built as a plugin for the Fiddler HTTP debugging proxy. Pentol Features CORS DETECTED Cross-Origin Resource Sharing CRLF DETECTED...
Cloudcheck : Checks Using A Test String If A Cloudflare DNS Bypass Is Possible Using CloudFail

Cloudcheck : Checks Using A Test String If A Cloudflare DNS...

Cloudcheck is made to be used in the same folder as CloudFail. Make sure all files in this repo are in the same...
Kubebot

Kubebot : A Security Testing Slackbot On The Google Cloud Platform

Kubebot is a security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform. Data...
Hatch

Hatch – Brute Force Tool That Is Used To Brute Force...

Hatch is a brute force tool that is used to brute force most websites. In order to use the this tool...
OSIF : Open Source Information Facebook

OSIF : Open Source Information Facebook

OSIF is an accurate Facebook account information gathering, all sensitive information can be easily gathered even though the target converts all of...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout