Friday, July 23, 2021
Home Tags Enumerator

Tag: Enumerator

Must Need

Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust : OSINT Tool To Evaluate Trustworthiness Of A Company

Should-I-Trust is a tool to evaluate OSINT signals for a domain. You're part of a review board that's responsible for evaluating new...
Cryptr : A Simple Shell Utility For Encrypting & Decrypting Files Using OpenSSL

Cryptr : A Simple Shell Utility For Encrypting & Decrypting Files...

Cryptr is a simple shell utility for encrypting and decryption files using OpenSSL. Installation
DNSteal : DNS Exfiltration Tool For Stealthily Sending Files Over DNS Requests

DNSteal : DNS Exfiltration Tool For Stealthily Sending Files Over DNS...

DNSteal is a fake DNS server that allows you to stealthily extract files from a victim machine through DNS requests. Below are...
SSRF Sheriff : Server Side Request Forgery

SSRF Sheriff : Server Side Request Forgery

SSRF Sheriff is an SSRF testing sheriff written in Go. It was originally created for the Uber H1-4420 2019 London Live Hacking...
CommandoVM : Complete Mandiant Offensive VM (Commando VM), The First Full Windows-Based Penetration Testing Virtual Machine Distribution

CommandoVM : Complete Mandiant Offensive VM (Commando VM), The First Full...

Welcome to CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming. Installation (Install...
ZPhisher : Automated Phishing Tool

ZPhisher : Automated Phishing Tool

Zphisher is an upgraded form of Shellphish. The main source code is from Shellphish. But I have not fully copied it. I...
What Do IT Consulting Companies Really Do?

What Do IT Consulting Companies Really Do?

No matter how big the industry is, IT technology and advancement have such a huge influence in many business operations.