Monday, November 30, 2020
Home Tags Cyber Threat

Tag: Cyber Threat

Must Need

Lynis

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth...
DjangoHunter

DjangoHunter : Tool To Identify Incorrectly Configured Django Applications

Djangohunter is a tool designed to help identify incorrectly configured Django applications that are exposing sensitive information. DjangoHunter Usage
AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

AWSGen.py : AWS S3 Bucket Name Generator (beta v.)

AWSGen.py is a simple tool for generates permutations, alterations and mutations of AWS S3 Buckets Names Also Read ...
Dejavu

Dejavu – Open Source Deception Framework

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...
Pentest Machine

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its output to the terminal...
Wireless Penetration Testing Approach: Kali Linux and Raspberry Pi for Security Analytics

Wireless Penetration Testing Approach: Kali Linux and Raspberry Pi for Security...

As of 2020, we all are aware of the security breaches happening to the data within the organization. The organizations are using...
goBox : GO Sandbox To Run Untrusted Code

goBox : GO Sandbox To Run Untrusted Code

goBox uses Ptrace to hook into READ syscalls, giving you the option to accept or deny syscalls before they are executed. GO...