Sunday, July 21, 2019
Home Tags Firewall

Tag: firewall

Must Need

Dejavu

Dejavu – Open Source Deception Framework

DejaVU is a open source deception framework. Deception techniques if deployed well can be very effective for organizations to improve network defense and can...
MEC

MEC : massExploitConsole For Concurrent Exploiting

massExploitConsole a collection of hacking tools with a CLI & UI for concurrent exploiting. Following are the features of MEC;

TakeOver : Takeover Script Extracts CNAME Record Of All Subdomains At...

Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku,...
Microctfs

Microctfs – Small CTF challenges running on Docker

Microctfs is a tool for small CTF challenges running on Docker. Microctfs Logviewer Build and Start logviewer challenge exposed on port 8000 cd logviewer docker build -t logviewer...

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors....
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...
FireELF

FireELF : Fileless Linux Malware Framework

FireELF is a opensource fileless linux malware framework thats crossplatform and allows users to easily create and manage payloads.

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout