Tuesday, March 26, 2019
Home Tags HUNT

Tag: HUNT

Must Need

IPv4Bypass – Using IPv6 to Bypass Security

IPv4Bypass bypass security using IPv6. Dependences python2.7 nmap python-nmap termcolor Example on how to run the tool $ python bypass.py -i eth0 -r 10.5.192.0/24 $ python...
BeeBug

BeeBug : A tool for checking Exploitability

BeeBug is a tool that can be used to verify if a program crash could be exploitable. This tool was presented the...
Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
Arping

Arping – To Discover Hosts on a Computer Network

Arping is a computer software tool that is used to discover hosts on a computer network. The program tests whether a given IP address...
Mcreator

Mcreator – Encoded Reverse Shell Generator With Techniques To Bypass AV’s

Mcreator is an Encoded Reverse Shell Generator With Techniques To Bypass AV's. Mcreator Installation git clone https://github.com/blacknbunny/mcreator.git && cd mcreator/ && python mcreator.py Also ReadVba2Graph – Generate...
Put2Win

Put2Win – Script To Automatize Shell Upload By PUT HTTP Method...

Put2Win is a script to automatize shell upload by PUT HTTP method to get meterpreter. It's necessary to have installed nmap and msfvenom tools...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...