Wednesday, July 28, 2021
Home Tags Dwarf

Tag: Dwarf

Must Need

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
havij

Havij Download – Advanced Automated SQL Injection Tool

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely...
InQL : A Burp Extension For GraphQL Security Testing

InQL : A Burp Extension For GraphQL Security Testing

InQL is a security testing tool to facilitate GraphQL technology security auditing efforts. InQL can be used as a stand-alone script or...
Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

Owasp D4n155 : Intelligent & Dynamic Wordlist Using Osint

OWASP D4N155 is an intelligent and dynamic wordlist using OSINT. It's an information security audit tool that creates intelligent wordlists based on...
AngrgDB : Use Angr Inside GDB

AngrgDB : Use Angr Inside GDB

AngrgDB use angr inside GDB. Create an angr state from the current debugger state. Install
AnonX : An Encrypted File Transfer Via AES-256-CBC

AnonX : An Encrypted File Transfer Via AES-256-CBC

AnonX is an encrypted file uploader and downloader. The uploaded archive lasts for one week and shall remove from the server. AnonX...
Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin : Exploitation Paths Allowing You To (Mis)Use The Windows Privileges

Priv2Admin idea is to "translate" Windows OS privileges to a path leading to: administrator,integrity and/or confidentiality threat,availability threat,just a...