Saturday, September 21, 2019
Home Tags Exploit

Tag: Exploit

Must Need

Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...
SQLMap v1.2.9

SQLMap v1.2.9 – Automatic SQL Injection & Database Takeover Tool

SQLMap v1.2.9 is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database...
Raptor WAF

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
Bashark

Bashark – Bash Pentesters & Security Researchers Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. To launch it on compromised host, simply source the bashark.sh script...
Droidefense

Droidefense – Advance Android Malware Analysis Framework

Droidefense (originally named atom: analysis through observation machine)* is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and...
Hackertarget

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...
Machinae : Machinae Security Intelligence Collector

Machinae : Machinae Security Intelligence Collector

Machinae is a tool for collecting intelligence from public sites/feeds about various security-related pieces of data: IP addresses, domain names, URLs, email...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout