Monday, August 20, 2018
Home Tags Hash

Tag: hash

Must Need

Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...
Concrete5 CMS

Vulnerability Scanner And Information Gatherer For The Concrete5 CMS – C5Scan

Vulnerability scanner and data gatherer for the Concrete5 CMS or C5Scan. Is somewhat outdated by and by pending a refactor. Concrete5 is an open-source content...
Evilginx

Evilginx – MITM Attack Framework For Phishing Credentials & Session Cookies

Evilginx is a Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service. It's core runs on Nginx HTTP server,...
Gpredict

Gpredict – Satellite Tracking Application

Gpredict is a real time satellite tracking and orbit prediction program for the Linux desktop. It uses the SGP4/SDP4 propagation algorithms together with NORAD two-line element...
WebvulScan

WebvulScan – Web Application Vulnerability Scanner

WebVulScan is a web application vulnerability scanner. It is a web application itself written in PHP and can be used to test remote, or...
Raptor WAF

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
onion

Onion nmap To Scan Hidden Onion Services

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...