Wednesday, September 18, 2019
Home Tags Hacking books

Tag: hacking books

Must Need

AMIRA: Automated Malware Incident Response & Analysis

AMIRA: Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters, in particular The...

ZIP File Raider – Burp Extension for ZIP File Payload Testing

ZIP File Raider is a Burp Suite extension for attacking web application with ZIP file upload functionality. You can easily inject Burp Scanner/Repeater payloads...
Reko

Reko : A General Purpose Decompiler

Reko (Swedish: "decent, obliging") is a C# project containing a decompiler for machine code binaries. This project is freely available under the GNU...
CloudBunny

CloudBunny – CloudBunny Is A Tool To Capture The Real IP...

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool...

Ten Facts about Your Resume That Will Blow Your Mind

Are you looking for a job? For this, you will need a resume. In this article, we are going to give you...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout