Tuesday, August 4, 2020
Home Tags Hack

Tag: Hack

Must Need

Constellation : A Graph-Focused Data Visualisation & Interactive Analysis Application

Constellation : A Graph-Focused Data Visualisation & Interactive Analysis Application

Constellation is a graph-focused data visualisation and interactive analysis application enabling data access, federation and manipulation capabilities across large and complex data...
OWASP Joomla Vulnerability Scanner

Joomscan – OWASP Joomla Vulnerability Scanner Project

JoomScan or OWASP Joomla Vulnerability Scanner is an open source project, developed with the aim of automating the task of vulnerability detection and reliability...
Box.JS : A Tool For Studying JavaScript Malware

Box.JS : A Tool For Studying JavaScript Malware

box.js is a utility to analyze malicious JavaScript. Installation Simply install box-js from npm:
Dow Jones Hammer : Protect The Cloud With The Power Of The Cloud(AWS)

Dow Jones Hammer : Protect The Cloud With The Power Of...

Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS...
CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
KsDumper : Dumping Processes Using The Power Of Kernel Space

KsDumper : Dumping Processes Using The Power Of Kernel Space

KsDumper is a dumping processes using the power of kernel space. It is a custom driver that would allow me to copy...
The Role of Digital Forensics in Solving Cyber Crimes

The Role of Digital Forensics in Solving Cyber Crimes

Your mobile app developers today have to understand more than simply putting together some code. They have to understand cybersecurity practices so...