Wednesday, June 16, 2021
Home Tags Heuristic Vulnerable

Tag: Heuristic Vulnerable

Must Need

Peepdf

PEEPDF : A One Stop Tool for PDF Document Forensic Analysis

Peepdf is a tool for forensic analysis of pdf documents. Most social engineering attacks use a malicious PDF document embedded with java-scripts & shell-codes. It...
Shodanfy.py : Get Ports, Vulnerabilities, Informations, Banners

Shodanfy.py : Get Ports, Vulnerabilities, Informations, Banners

Shodanfy.py is a tool to get ports,vulnerabilities,informations,banners,..etc for any IP with Shodan (no apikey! no rate limit!) Usage
CloudBunny

CloudBunny – CloudBunny Is A Tool To Capture The Real IP...

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool...
Bosque

Microsoft Bosque Programming Language

The Bosque programming language is a Microsoft Research project that is investigating language designs for writing code that is simple, obvious, and easy to...
HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePWN : Swiss Army Knife for Pentesting of IoT Devices

HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and...
AutoPwn : Automate Repetitive Tasks For Fuzzing

AutoPwn : Automate Repetitive Tasks For Fuzzing

Completely re-writing this right now. Focus will be on interactive Linux apps that only take input from stdin for starters. Attempting...
Corsair_Scan : A Security Tool To Test Cross-Origin Resource Sharing (CORS)

Corsair_Scan : A Security Tool To Test Cross-Origin Resource Sharing (CORS)

Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS) misconfigurations. CORS is a mechanism that allows restricted resources on a...