Thursday, October 17, 2019
Home Tags Hashes

Tag: hashes

Must Need

Vba2Graph

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph, with potential malicious keywords...
ScanQLi – To Detect SQL Vulns

ScanQLi – To Detect SQL Vulns

ScanQLi is a simple SQL injection scanner with somes additional features. This tool can't exploit the SQLi, it just detect them. Tested...
Semantic : Parsing, Analysing & Comparing Source Code Across Many Languages

Semantic : Parsing, Analysing & Comparing Source Code Across Many Languages

Semantic is a Haskell library and command line tool for parsing, analysing, and comparing source code. Usage
TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

TOR Router : A Tool That Allow You To Make TOR...

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only...
Bincat

Bincat : Binary Code Static Analyser With IDA Integration

BinCAT is a static Binary Code Analysis Toolkit, designed to help reverse engineers, directly from IDA or using Python for automation.
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...