Thursday, June 17, 2021
Home Tags Hostnames

Tag: Hostnames

Must Need

IP-Biter

IP-Biter : The Hacker-friendly E-Mail Tracking Framework

IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed in e-mails,...
Osmedeus  – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And...

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Ddos2track

Ddos2track – Script To Avoid HTTP Floods Attacks

With Ddos2track tool you can block HTTP Flood Attacks and break down them with a honeypot. THE TOOL SEND YOU AN ADVERTISING EMAIL AFTER DETECT A...
Santa : A Binary Whitelisting/Blacklisting System For macOS

Santa : A Binary Whitelisting/Blacklisting System For macOS

Santa is a binary authorization system for macOS. It consists of a kernel extension (or a system extension on macOS 10.15+) that...
AutoPentest DRL : Automated Penetration Testing Using Deep Reinforcement Learning

AutoPentest DRL : Automated Penetration Testing Using Deep Reinforcement Learning

AutoPentest-DRL is an automated penetration testing framework based on Deep Reinforcement Learning (DRL) techniques. AutoPentest-DRL can determine the most appropriate attack path...
DrMemory : Memory Debugger for Windows, Linux, Mac & Android

DrMemory : Memory Debugger for Windows, Linux, Mac & Android

DrMemory is a memory monitoring tool capable of identifying memory-related programming errors such as accesses of uninitialized memory, accesses to unaddressable memory...