Thursday, July 2, 2020
Home Tags Exploit Writing

Tag: Exploit Writing

Must Need

Reload.sh

Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without...

Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running...
Whitewidow : SQL Vulnerability Scanner

Whitewidow : SQL Vulnerability Scanner

Whitewidow is an open source automated SQL vulnerability scanner, that is capable of running through a file list, or can scrape Google...
DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
GCPBucketBrute  : A Script To Enumerate Google Storage Buckets

GCPBucketBrute : A Script To Enumerate Google Storage Buckets

GCPBucketBrute is a script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can...
Electronegativity

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in...

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can...
Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor : Endpoint Detection & Malware Analysis Software

Attack Monitor is Python application written to enhance security monitoring capabilities of Windows 7/2008 (and all later versions) workstations/servers and...
Reko

Reko : A General Purpose Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU...