Wednesday, April 8, 2020
Home Tags Java

Tag: Java

Must Need

Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
Barq: The AWS Cloud Post Exploitation Framework

Barq: The AWS Cloud Post Exploitation Framework

Barq is a post-exploitation framework that allows you to easily perform attacks on a running AWS infrastructure. It allows you to attack...
Bscan

Bscan : An Asynchronous Target Enumeration Tool

Bscan is a command-line utility to perform active information gathering and service enumeration. At its core, bscan ...
GCPBucketBrute  : A Script To Enumerate Google Storage Buckets

GCPBucketBrute : A Script To Enumerate Google Storage Buckets

GCPBucketBrute is a script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can...
AtomShields CLI : Security Testing Framework For Repositories & Source Code

AtomShields CLI : Security Testing Framework For Repositories & Source Code

AtomShields Cli is a Command-Line Interface to use the software AtomShields. AtomShields is a security testing framework for repositories and source code.
Phishing Frenzy

Phishing Frenzy – Ruby on Rails Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the...
Libssh-Scanner

Libssh-Scanner : Script to identify hosts vulnerable to CVE-2018-10933

Libssh-Scanner is a python based script to identify hosts vulnerable to CVE-2018-10933. Libssh scanner has two modes: passive (banner grabbing) and aggressive (bypass auth)...