Saturday, July 20, 2019
Home Tags CUCM

Tag: CUCM

Must Need

Bashark

Bashark – Bash Pentesters & Security Researchers Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. To launch it on compromised host, simply source the bashark.sh script...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0 was released. It was...
Instainsane

Instainsane : Multi-threaded Instagram Brute Forcer

Instainsane is an Shell Script to perform multi-threaded brute force attack against Instagram, this script can bypass login limiting and it...
GodOfWar

GodOfWar : Malicious Java WAR Builder With Built-In Payloads

GodOfWar is a command-line tool to generate war payloads for penetration testing / red teaming purposes, written in ruby.
Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of...
hydra

Online Password Bruteforce with Hydra-GTK

Hydra (better known as "thc-hydra") is an online password attack tool. It brute forces various combinations on live services like telnet, ssh, http, https,...
Converto : Installing Kali Linux on VPS Server

Converto : Installing Kali Linux on VPS Server

Converto is a automated Kali Linux or Parrot OS installer for VPS, also installs VNC (Graphical / Non-Graphical VNC). It is tested...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout