Thursday, March 21, 2019
Home Tags Ids

Tag: ids

Must Need

R3Con1Z3R

R3Con1Z3R : A Lightweight Web Information Gathering Tool With an Intuitive...

R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which...
shellcode-encrypter-decrypter

Shellcode-Encrypter-Decrypter : Shellcode Encrypter & Decrypter by using XOR Cipher

Shellcode-Encrypter-Decrypter is a Shellcode Encrypter & Decrypter, Using XOR Cipher to enc and dec shellcode. Shellcode-Encrypter-Decrypter Installation git clone https://github.com/blacknbunny/Shellcode-Encrypter-Decrypter.git && cd Shellcode-Encrypter-Decrypter/ python enc.py --help Also ReadMunin...
BurpSuite Extension Ruby

BurpSuite Extension Ruby : Template to speed up building a...

Due the lake of examples and implementations of BurpSuite Extension Ruby, we have decided to make it easy for all rubyists to have a...

GTRS – Google Translator Reverse Shell 2018

GTRS tools uses Google Translator as a proxy to send arbitrary commands to an infected machine. ==HTTPS==> ==HTTP==> GTRS Environment Configuration First you need a...
Blackowl

Blackowl – Tool To Gather Information, Based On Operative-Framework

Blackowl is a simple tool to gather information, based on Operative-Framework. Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security. Blackowl Requirements requests ...
Masscan

How to use Masscan to Enumerate Large Number of Hosts Quickly

Masscan has been around for some time now and already it's in use by pentesters all around. It's a reconnaissance tool which can transmit up to 10...
GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...