Saturday, June 6, 2020
Home Tags Integer Underflow

Tag: Integer Underflow

Must Need

Stowaway : Multi-hop Proxy Tool For Pentesters

Stowaway : Multi-hop Proxy Tool For Pentesters

Stowaway is Multi-hop proxy tool for security researchers and pentesters Users can easily proxy their network traffic to intranet nodes (multi-layer)...
Metabigor : Intelligence Tool But Without API Key

Metabigor : Intelligence Tool But Without API Key

Metabigor is Intelligence tool, its goal is to do OSINT tasks and more but without any API key.
Minimalistic Offensive Security Tools

Minimalistic Offensive Security Tools

Minimalistic is a simple SMB login attack and password spraying tool. It takes a list of targets and...
Exploit Development

Best Exploit Development Resources For Simulated Attacks

An exploit development is a bit of programming, a piece of information, or a grouping of commands that exploits a bug or vulnerability with...
Linux on Mac

Learn How to Run Linux on Mac Computers With This Guide

Some people perceive Linux as an underdog in an OS realm dominated by Windows and Apple. Yet, there’s no shortage...
Crashcast

Crashcast-Exploit : Tool To Mass Play YouTube Video, Terminate Apps &...

CRASHCAST mass-exploit tool allows you to mass play any YouTube video, remotely terminate apps, and rename Chromecast device(s) obtained from Shodan.io.
Corsy : CORS Misconfiguration Scanner

Corsy : CORS Misconfiguration Scanner

Corsy is a lightweight program that scans for all known mis-configurations in CORS implementations.