Thursday, January 23, 2020
Home Tags Kubernetes

Tag: Kubernetes

Must Need

KBD-Audio

KBD-Audio : Tools For Capturing & Analysing Keyboard Input Paired With...

KBD-Audio is a collection of command-line and GUI tools for capturing and analyzing audio data. The most interesting tool is called keytap - it...
AMIRA: Automated Malware Incident Response & Analysis

AMIRA: Automated Malware Incident Response & Analysis

AMIRA is a service for automatically running the analysis on the OSXCollector output files. The automated analysis is performed via OSXCollector Output Filters, in particular The...

theZoo – A Repository Of LIVE Malwares For Your Own Joy...

theZoo purpose is to allow the study of malware and enable people who are interested in malware analysis to have access to live malware, analyses...
Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-based Blind-SQL Injection In HTTP-Headers

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
Routersploit

RouterSploit – Exploitation Framework For Embedded Devices

Routersploit is an open-source exploitation Framework to perform various penetration testing operations with embedded devices. The Routersploit contains various modules that perform penetration testing operations exploits...
Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...
Hacking Tools

Best Hacking Tools List for Hackers & Security Professionals 2018

A curated list of marvelous Hacking Tools. Hacking Tools are all the more frequently utilized by security businesses to test the vulnerabilities in system...