Thursday, October 17, 2019
Home Tags Exploitation

Tag: exploitation

Must Need

Evilginx2

Evilginx2 – Standalone MITM Attack Framework Used For Phishing Login Credentials...

Evilginx2 is a man-in-the-middle attack framework used for phishing login credentials along with session cookies, which in turn allows to bypass 2-factor authentication protection. This...
Pown Duct : Essential Tool For Finding Blind Injection Attacks

Pown Duct : Essential Tool For Finding Blind Injection Attacks

Pown Duct is an essential tool for finding blind injection attacks using DNS side-channels. This tool is part of secapps.com open-source initiative.
DarkSpiritz

DarkSpiritz : A Penetration Testing Framework For Linux, MacOS, and Windows...

DarkSpiritz is a penetration testing framework for Linux and Windows systems. Created by the SynTel Team it was a project of one of the...
Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types...

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool...
PwnBack

PwnBack – Burp Extender Plugin That Generates A Sitemap Of A...

PwnBack requires PhantomJS to run. To understand why it is required currently see the section PhantomsJS. The plugin has several settings that a user can...
Raptor WAF

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
Dnsenum

Dnsenum – Tool for DNS enumeration to find DNS Servers

Dnsenum is a tool for DNS enumeration, which is the process of locating all DNS servers and DNS entries for an organization. DNS enumeration will allow us...