Thursday, October 17, 2019
Home Tags HOIC

Tag: HOIC

Must Need

DefectDojo

Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application...
Legion

Legion : An Open Source, Easy-To-Use, Super-extensible & Semi-Automated Network Penetration...

Legion, a fork of SECFORCE's Sparta, is an open source, easy-to-use, super-extensible and semi-automated network penetration testing framework that aids...
UDP2Raw Tunnel

UDP2Raw Tunnel – A Tunnel which Turns UDP Traffic into Encrypted...

Udp2raw Tunnel is a tunnel which turns UDP Traffic into Encrypted FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls(or Unstable UDP...
Osmedeus

Osmedeus : Fully Automated Offensive Security Tool for Reconnaissance & Vulnerability...

Osmedeus allow you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. If you have...
Blackowl

Blackowl – Tool To Gather Information, Based On Operative-Framework

Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests ...
H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

H2Buster : A Threaded, Recursive, Web Directory Brute-Force Scanner Over HTTP/2

H2Buster is a threaded, recursive, web directory brute-force scanner over HTTP/2 using hyper, inspired by Gobuster. Following are the features;
Sudomy : Subdomain Enumeration Tool Created Using A Bash Script

Sudomy : Subdomain Enumeration Tool Created Using A Bash Script

Sudomy is a subdomain enumeration tool, created using a bash script, to analyze domains and collect subdomains in fast and comprehensive way.