Monday, July 6, 2020
Home Tags ISPY

Tag: ISPY

Must Need

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

RedHunt OS : Virtual Machine for Adversary Emulation & Threat Hunting

Virtual Machine for Adversary Emulation and Threat Hunting by RedHunt Labs. RedHunt OS aims to be a one stop shop for all your...
Ghost Phisher

Ghost Phisher – Wireless & Ethernet Attack Software Application

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI...
PHP

PHP : Security Check List 2019

PHP : Hypertext Preprocessor is a web-based, server-side, multi-use, general-purpose, scripting and programming language that can be embedded in HTML....
Hack Windows Installer

Hack Windows Installer For The Hack Typeface

Hack Windows Installer A Hack Windows installer for the Hack typeface. While it may appear like pointless excess to utilize a hack windows installer for fonts,...
Sandcastle : A Python Script For AWS S3 Bucket Enumeration

Sandcastle : A Python Script For AWS S3 Bucket Enumeration

Inspired by a conversation with Instacart's @nickelser on HackerOne, I've optimized and published Sandcastle – a Python script for AWS S3 bucket...
Injectus : CRLF & Open Redirect Fuzzer

Injectus : CRLF & Open Redirect Fuzzer

Injectus is a simple python tool that goes through a list of URLs trying CRLF and open redirect payloads.
IdentYWAF

IdentYWAF : Blind WAF Identification Tool

identYwaf is an identification tool that can recognise web protection type (i.e. WAF) based on blind inference. Blind inference is...