Tuesday, July 27, 2021
Home Tags CI

Tag: CI

Must Need

HashCheck : Tool To Assist In The Search For Leaked Passwords

HashCheck : Tool To Assist In The Search For Leaked Passwords

HashCheck is a project aims to assist in the search for leaked passwords while maintaining a high level of privacy using the...
Columbo : A Computer Forensic Analysis Tool Used To Simplify & Identify Specific Patterns In Compromised Datasets

Columbo : A Computer Forensic Analysis Tool Used To Simplify &...

Columbo is a computer forensic analysis tool used to simplify and identify specific patterns in compromised datasets. It breaks down data to...
ScriptHunter : Tool To Find JavaScript Files On Websites

ScriptHunter : Tool To Find JavaScript Files On Websites

Scripthunter is a tool that finds javascript files for a given website. To scan Google, simply run ./scripthunter.sh https://google.com. Note that it...
Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
Buster : Find Emails Of A Person And Return Information Associated With Them

Buster : Find Emails Of A Person And Return Information Associated...

Buster is a tool to find emails of a person and return info associated with them. It is a simple OSINT tool...
Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

Hakrawler : Discovery Of Endpoints & Assets Within A Web Application

Hakrawler is a Go web crawler designed for easy, quick discovery of endpoints and assets within a web application. It can...
How to Protect Yourself Against Common Password Attacks

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the near future....