Tuesday, March 26, 2019
Home Tags Dos attack

Tag: dos attack

Must Need

OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
Introspy

Introspy – Security Profiling For Blackbox iOS

Introspy is a Blackbox tool to help understand what an iOS application is doing at runtime and assist in the identification of potential security...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
Decker

Decker : Declarative Penetration Testing Orchestration Framework

Decker is a penetration testing orchestration framework. It leverages HashiCorp Configuration Language 2 (the same config language as Terraform) to allow declarative...
Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...
AWS Key Disabler

AWS Key Disabler – Lambda Script That Will Disable Access Keys...

The AWS Key disabler is a Lambda Function that disables AWS IAM User Access Keys after a set amount of time in order to...
Hijacker

All-in-One Wi-Fi Cracking Tools for Android – Hijacker v1.5

Hijacker v1.5 is a Graphical User Interface for the penetration testing instruments Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a basic and simple UI...