Monday, July 13, 2020
Home Tags DBA

Tag: DBA

Must Need

KatroLogger : KeyLogger for Linux Systems

KatroLogger : KeyLogger for Linux Systems

KatroLogger is a tool used for KeyLogger for Linux Systems. Features Runs on GUI systems...
EvilApp : Phishing Attack Using An Android Application

EvilApp : Phishing Attack Using An Android Application

Man-in-the-middle phishing attack using an Android app to grab session cookies for any website, which in turn allows to bypass 2-factor authentication...
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
SQL Injection

SQLMap – SQL Injection & Database Automatic Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers....
Orbit : Blockchain Transactions Investigation Tool

Orbit : Blockchain Transactions Investigation Tool

Orbit is designed to explore network of a blockchain wallet by recursively crawling through transaction history. The data is rendered as a...
Mr SIP

Mr SIP : SIP-Based Audit and Attack Tool

Mr SIP is a tool developed to audit and simulate SIP-based attacks. Originally it was developed to be used in academic work to help...
Peda

Peda – Python Exploit Development Assistance for GDB

PEDA is a python exploit development assistance for GDB. Features Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. ...