Sunday, March 29, 2020
Home Tags Databases

Tag: Databases

Must Need

RansomCoinPublic : A DFIR Tool To Extract Cryptocoin Addresses

RansomCoinPublic : A DFIR Tool To Extract Cryptocoin Addresses

RansomCoinPublic is a DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries. Extracting metadata and hardcoded Indicators of...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
Telebix

Telebix – Telebix is an application that communicates with a Bot...

Telebix is an application that communicates with a Bot on the Telegram to receive commands and send information from an infrastructure monitored by Zabbix,...
Airbash

Airbash – A Shell Script For Automated WPA PSK Handshake Capture

Airbash is a POSIX-compliant, completely computerized WPA PSK handshake capture script went for penetration testing. It is perfect with Bash and Android Shell (tried...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Http Request Smuggler : Extension For Burp Suite

Http Request Smuggler : Extension For Burp Suite

This is an extension for Burp Suite designed to help you launch HTTP Request Smuggler attacks, originally created during HTTP Desync Attacks research.
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...