Thursday, June 17, 2021
Home Tags Intercept

Tag: Intercept

Must Need

Git Vuln Finder : Finding Potential Software Vulnerabilities From Git Commit Messages

Git Vuln Finder : Finding Potential Software Vulnerabilities From Git Commit...

Git Vuln Finder finds potential software vulnerabilities from git commit messages. The output format is a JSON with the associated commit which...
Most Important Security Tips to Protect Your Website From Hackers

Most Important Security Tips to Protect Your Website From Hackers

Do you think they need your date? Do you think they need access to your credit cards? There is something more...
Important Reasons Why Hiding Your IP Address is a Good Idea

Important Reasons Why Hiding Your IP Address is a Good Idea

The internet can be a goldmine of information, but if you’re not careful enough, it can also be the reason why you’ll experience identity...
Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator : Automate Metasploit Scanning And Exploitation

Exploitivator is a automate Metasploit scanning and exploitation. This has only been tested on Kali. It depends on the...
Go-RouterSocks : Router Sock. One Port Socks For All The Others

Go-RouterSocks : Router Sock. One Port Socks For All The Others

Go-RouterSocks is a next step after compromising a machine is to enumerate the network behind. Many tools exist to expose a socks...
CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner

CorsMe : Cross Origin Resource Sharing MisConfiguration Scanner

A CorsMe misconfiguration scanner tool based on golang with speed and precision in mind ! Misconfiguration type this...
uDork : Tool That Uses Advanced Google Search Techniques

uDork : Tool That Uses Advanced Google Search Techniques

uDork is a script written in Bash Scripting that uses advanced Google search techniques to obtain sensitive information in files or directories,...