Thursday, October 22, 2020
Home Tags CVE-API

Tag: CVE-API

Must Need

Scrounger

Scrounger – Mobile Application Testing Toolkit

Scrounger is a mobile application toolkit. The word Scrounger means a person who borrows from or lives off others. There is no better description...
Privacy Badger : A Browser Extension Automatically Learns To Block Invisible Trackers

Privacy Badger : A Browser Extension Automatically Learns To Block Invisible...

Privacy Badger is a browser extension that automatically learns to block invisible trackers. Instead of keeping lists of what to block, Privacy...
Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY : Recognition Usernames In 187 Social Networks

Userrecon PY is a tool used to recognise usernames in 187 social networks. So first of all let us have a look...
Ustealer : Steal Ubuntu Information In Local PC

Ustealer : Steal Ubuntu Information In Local PC

Ustealer is a Ubuntu stealer, steal Ubuntu information in local PC. This tool is always good to go with the USB key....
URH

URH : Universal Radio Hacker To Investigate Wireless Protocols Like A...

URH (Universal Radio Hacker) is a software for investigating unknown wireless protocols. Features include Hardware Interfaces for common Software Defined Radios Easy Demodulation of...
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor is Python application written to enhance security monitoring capabilities of Windows 7/2008 (and all later versions) workstations/servers and...