Tuesday, September 17, 2019
Home Tags HUNT


Must Need


Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
Semantic : Parsing, Analysing & Comparing Source Code Across Many Languages

Semantic : Parsing, Analysing & Comparing Source Code Across Many Languages

Semantic is a Haskell library and command line tool for parsing, analysing, and comparing source code. Usage

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....
Headless Burp

Headless Burp – Automate security tests using Burp Suite

Headless Burp provides an extension to Burp that allows you to run Burp Suite's Spider and Scanner tools in headless mode via command-line. However, it...

Chkdfront : Checks If Your Domain Fronting is Working

Chkdfront checks if your domain fronting is working by testing the targeted domain (fronted domain) against your domain front domain.

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing,...

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...

Shopping cart

Shipping and discount codes are added at checkout.