Friday, July 23, 2021
Home Tags Credentials

Tag: Credentials

Must Need

DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
Fireprox : AWS API Gateway Management Tool For Creating On The Fly HTTP

Fireprox : AWS API Gateway Management Tool For Creating On The...

Being able to hide or continually rotate the source IP address when making web calls can be difficult or expensive. A number...
RiskySPN

RiskySPN – Collection of PowerShell Scripts Focused on Detecting and Abusing...

RiskySPN is a collection of PowerShell scripts focused on detecting and abusing accounts associated with SPNs (Service Principal Name). This module can assist blue...
ROADTools : The Azure AD Exploration Framework

ROADTools : The Azure AD Exploration Framework

ROADtools is a framework to interact with Azure AD. It currently consists of a library (roadlib) and the ROADrecon Azure AD exploration...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
HashPump

HashPump – Tool To Exploit Hash Length Extension Attack In Various...

HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump...
OWTF

OWTF – Offensive Web Testing Framework Great Tools & Make Pen...

OWTF or Offensive Web Testing Framework, is a framework which tries to unite great tools and make pen testing more efficient. OWASP OWTF is...