Friday, August 23, 2019
Home Tags FakeImageExploiter

Tag: FakeImageExploiter

Must Need

ReconDog

ReconDog – Reconnaissance Swiss Army Knife

Following are the ReconDog main features, Wizard + CLA interface Can extracts targets from STDIN (piped input) and act upon them All the information...
Dawnscanner

Dawnscanner – Static Analysis Security Scanner

Dawnscanner is a static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails...
Java-Stager

Java-Stager : A PoC To Download, Compile & Execute A Java...

A PoC Java-Stager which can download, compile, and execute a Java file in memory. The key parts of the talk for me are: Load a...
LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost : A LAN Dropbox Chatbot Controllable Via Telegram

LANGhost is designed for Raspberry Pis (Raspbian/Kali for RPi). Running it on other/desktop distros could cause issues and may not work as...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
Windows Linux Kernel Is Now Available Via WSL 2

Windows Linux Kernel Is Now Available Via WSL 2

At the point when Microsoft first reported bash on Windows and brought Linux inside Windows as Windows Subsystem for Linux or WSL,...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout