Tuesday, July 27, 2021
Home Tags Email

Tag: Email

Must Need

Pwned

Pwned – A Command-Line Tool For Querying The ‘Have I been...

A command-line tool for querying Troy Hunt's Have I been pwned ? service using the hibp Node.js module. Pwned Installation Download and install Node.js, then install...
AutoRDPwn : The Shadow Attack Framework

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers.
Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host

Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host

PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.
FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

FlashSploit : Exploitation Framework For ATtiny85 Based HID Attacks

Flashsploit is an Exploitation Framework for Attacks using ATtiny85 HID Devices such as Digispark USB Development Board, flashsploit generates Arduino IDE Compatible...
Catnip

Catnip : Automated Basic Pentest Tool – Designed For Kali Linux

Catnip tool will make your basic pentesting task like Information Gathering, Auditing, And Reporting so this tool will do every...
XSS-Payload-List

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....
Wafw00f : Identify & Fingerprint Web Application Firewall

Wafw00f : Identify & Fingerprint Web Application Firewall

WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website. To do its magic, WAFW00F does...