Wednesday, January 29, 2020
Home Tags DefectDojo

Tag: DefectDojo

Must Need

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox : Virtual Machine Introspection, Tracing & Debugging

Icebox is a Virtual Machine Introspection solution that enable you to stealthily trace and debug any process (kernel or user). It's based...
Manati : A Web-Based Tool To Assist The Work Of The Intuitive Threat Analysts

Manati : A Web-Based Tool To Assist The Work Of The...

The goal of the ManaTI project is to develop machine learning techniques to assist an intuitive threat analyst to speed the discovery...
Corsy : CORS Misconfiguration Scanner

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations.

Firebase – Tool To Exploiting Misconfigured Firebase Databases

Firebase exploiting tool is exploiting misconfigured firebase databases. Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...
RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief : Extracting Clear Text Passwords From mstsc.exe Using API Hooking

RDPThief by itself is a standalone DLL that when injected in the mstsc.exe process, will perform API hooking, extract the clear-text credentials...
Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of PyQt5 & Frida

Dwarf : Full Featured Multi Arch/OS Debugger Built On Top Of...

Dwarf is a debugger for reverse engineers, crackers and security analyst. Or you can call it damn, why are raspberries so fluffy...
HABU

HABU – Network Penetration Testing Toolkit for Hackers and Pentesters

Habu is a python network hacking toolkit. This tool basic functions that help with some tasks for Ethical Hacking and Penetration Testing. Most of...