Thursday, May 13, 2021
Home Tags IT and Tech Challenges

Tag: IT and Tech Challenges

Must Need

havij

Havij Download – Advanced Automated SQL Injection Tool

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It's a completely...
Residential vs. Data Center Proxies: How do they differ?

Residential vs. Data Center Proxies: How do they differ?

Cybercrime is on the rise. And INTERPOL even projects that the cases will continually increase well into the future. As such, you...
CertCrunchy

CertCrunchy – Silly Recon Tool That Uses Data From SSL Certificates...

CertCrunchy is just a silly python script that either retrieves SSL Certificate based data from online sources, currently https://crt.sh/, https://certdb.com/, https://sslmate.com/certspotter/ and https://censys.io or...
Mud-Visualizer : A Tool To Visualize MUD Files

Mud-Visualizer : A Tool To Visualize MUD Files

Mud-Visualizer is a tool can be used to visualize the MUD files in JSON format. Warning: mud-visualizer is...
XssPy

XssPy – Web Application XSS Scanner

XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty...
Taken : Takeover AWS IPS & Have A Working POC For Subdomain Takeover

Taken : Takeover AWS IPS & Have A Working POC For...

Taken is a tool to takeover AWS ips and have a working POC for Subdomain Takeover. Idea is simple
Obfuscator : The Program Is Designed To Obfuscate The Shellcode

Obfuscator : The Program Is Designed To Obfuscate The Shellcode

Obfuscator program is designed to obfuscate the shellcode. Currently the tool supports 2 encryption. XOR AES