Friday, March 5, 2021
Home Tags Hash

Tag: hash

Must Need

WhatTheHack : A Collection Of Challenge Based Hack

WhatTheHack : A Collection Of Challenge Based Hack

WhattheHack is a challenge based hackathon format. A collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code...
Wave-Share : Serverless, Peer-To-Peer, Local File Sharing Through Sound

Wave-Share : Serverless, Peer-To-Peer, Local File Sharing Through Sound

A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser.
LeakLooker

LeakLooker : Find open databases with Shodan

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results from Shodan,...
AutoSploit and AutoScanner

AutoNSE – Massive NSE AutoSploit and AutoScanner

Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner. The Nmap Scripting Engine (NSE) is one of Nmap's most capable and adaptable features. It enables...
Raptor

Raptor WAF : Web Application Firewall Using DFA Beta

Raptor is a Web application firewall made in C, uses DFA to block SQL injection, Cross site scripting and path traversal.
Why Some Canon Printers Are More Effective Than Others

Why Some Canon Printers Are More Effective Than Others

Not all printers are created equal and that is as true when it comes to comparing printers from the same manufacturer. If...
Robber

Robber : Tool For Finding Executables Prone To DLL Hijacking

Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. So What Is DLL Hijacking? Windows has a search path...