Tuesday, July 17, 2018
Home Tags Exploitation

Tag: exploitation

Must Need

Sylkie

Sylkie – IPv6 Address Spoofing With The Neighbor Discovery Protocol

Sylkie is a command line device and library for testing systems for normal address spoofing security vulnerabilities in IPv6 systems utilizing the Neighbor Discovery...
Armory

Armory – Tool To Take Lot Of External & Discovery Data

Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Sqlmap

SQLMAP – Enumeration of Databases & Users from Vulnerable Web Forms

Sqlmap is a database assessment tool which pentesters & security researchers can use to enumerate databases of various types. Sqlmap automates a normal &...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
Material Components

Material Components for Android

Material Components for Android (MDC-Android) enable engineers to execute Material Design. Created by a core team of engineers and UX designers at Google, these...
Metasploit Framework

Metasploit Framework – A Beginner’s Guide for Penetration Testing, Exploit Development...

Metasploit Framework is a collection of exploits, shellcodes, fuzzing tools, payloads, encoders etc. Moreover, we can regard it as a collection of exploitation tools...