Sunday, September 22, 2019
Home Tags Databases

Tag: Databases

Must Need

Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
DVIA

DVIA – Damn Vulnerable iOS Application

Damn Vulnerable iOS App or DVIA is an iOS application that is damn vulnerable. Its fundamental objective is to give a stage to portable...
RecScanSec – Reconnaisance Scanner Security

RecScanSec – Reconnaisance Scanner Security

RecScanSec made for reconnaisance Scanner and information gathering with an emphasis on simplicity. Following are the features of the scanner; Information...
Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir : A Coroutines-Driven Low & Slow Traffic Sender

Finshir is a high-performant, coroutines-driven, and fully customisable implementation of Low & Slow load generator designed for real-world pentesting.
Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File Within An Image

Stegify : Go Tool For LSB Steganography,Capable Of Hiding Any File...

Stegify is a Go tool for LSB steganography, capable of hiding any file within an image. It is a...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

TOR Router : A Tool That Allow You To Make TOR...

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout