Wednesday, August 4, 2021
Home Tags Commandline

Tag: Commandline

Must Need

burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration...

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's a java executable and...
Discover : Custom Bash Scripts Used To Automate Various Penetration Testing Tasks

Discover : Custom Bash Scripts Used To Automate Various Penetration Testing...

Discover custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with...
Attacker-Group-Predictor : Tool To Predict Attacker Groups

Attacker-Group-Predictor : Tool To Predict Attacker Groups

Attacker-Group-Predictor is a tool predicts attacker groups from techniques and software used. It searches based on the MITRE ATT&CK™ framework.
Introspy-iOS

Introspy-iOS : Security Tool For Profiling iOS Application at Runtime

Introspy-iOS is a blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
H8mail

H8mail – Email OSINT And Password Breach Hunting

Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamous...
Karma

Karma : Find Leaked Emails with Your Passwords

Karma is a tool used for find leaked emails with your passwords. Usage this program for attacking targets without prior consent is...
Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls...