Sunday, January 24, 2021
Home Tags Event Logging

Tag: Event Logging

Must Need

Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
XSS Fuzzer

XSS Fuzzer : Tool Which Generates XSS Payloads Based On User-Defined...

XSS Fuzzer is a simple application written in plain HTML/JavaScript/CSS which generates XSS payloads based on user-defined vectors using multiple placeholders which are replaced...
7 Best Apps to Hack Girlfriend’s Phone to View Text Messages

7 Best Apps to Hack Girlfriend’s Phone to View Text Messages

Ever got a gut feeling that your girl is seeing someone else behind your back or cheating on you? That can be...
Parth : Heuristic Vulnerable Parameter Scanner

Parth : Heuristic Vulnerable Parameter Scanner

Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually contains URLs...
Project iKy v2.5.0 – Tool That Collects Information From An Email

Project iKy v2.5.0 – Tool That Collects Information From An Email

Project iKy is a tool that collects information from an email and shows results in a nice visual interface.
EvilOSX

EvilOSX – An Evil Remote Administration Tool For MacOS / OS...

EvilOSX is an Evil Remote Administration Tool For MacOS / OS X with the following features like Emulate a terminal instance, Simple extendable module...
Reload.sh

Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without...

Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running...