Thursday, May 13, 2021
Home Tags Http

Tag: http

Must Need

Traitor : Automatic Linux Privesc Via Exploitation Of Low-Hanging Fruit E.G. GTFOBin

Traitor : Automatic Linux Privesc Via Exploitation Of Low-Hanging Fruit E.G....

Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities (including most of GTFOBins) in order to pop a...
Need Notepad, but on a Mac? No Problem

Need Notepad, but on a Mac? No Problem

ntroduction The Apple corporation has been a steady stream of news headlines for years now, this year saw the...
NoSQLi : NoSql Injection CLI Tool

NoSQLi : NoSql Injection CLI Tool

NoSQL1 is a NoSQL scanner and injector. I wanted a better nosql injection tool that was simple to use, fully command line...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious...

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence sources can...
Netenum : Network Reconnaisance Tool That Sniffs For Active Hosts

Netenum : Network Reconnaisance Tool That Sniffs For Active Hosts

Netenum passively monitors the ARP traffic on the network. It extracts basic data about each active host, such as IP address, MAC...
Peda

Peda – Python Exploit Development Assistance for GDB

PEDA is a python exploit development assistance for GDB. Features Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. ...
ADAPT

ADAPT : Tool That Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...