Saturday, October 19, 2019
Home Tags Digital Forensics

Tag: Digital Forensics

Must Need

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation...

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote...
Crackle

Crackle – Crack Bluetooth Smart Encryption

Crackle cracks BLE Encryption. It exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force...
HashPump

HashPump – Tool To Exploit Hash Length Extension Attack In Various...

HashPump is a tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512. Menu $ hashpump -h HashPump...
PureBlood

PureBlood – A Penetration Testing Framework created for Hackers / Pentester...

PureBlood is a tool for penetration testing framework created for Hackers / Pentester / Bug Hunter. Thanks to Cr4sHCoD3 for developing the tool. Also Read Dejavu...
NodeJsScan

NodeJsScan – Static Security Code Scanner For Node.js Applications

NodeJsScan is a static security code scanner (SAST) for Node.js applications. Configure & Run Install Postgres and configure SQLALCHEMY_DATABASE_URI in core/settings.py pip3 install -r requirements.txt python3 migrate.py #...
VBScan

VBScan – OWASP Is A Black Box vBulletin Vulnerability Scanner

OWASP VBScan (short for ulletin Vulnerability ner) is an opensource project in perl programming language to detect VBulletin CMS vulnerabilities and analysis them . If...
Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph Theory

Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph...

Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat table...