Monday, October 21, 2019
Home Tags Layer 2 attacks

Tag: layer 2 attacks

dnsniff macof

macof

Must Need

TLS-Scanner

TLS-Scanner : The TLS-Scanner Module from TLS-Attacker

TLS-Scanner is a tool created by the Chair for Network and Data Security from the Ruhr-University Bochum to assist pentesters and security researchers in...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
GrapheneX : Automated System Hardening Framework

GrapheneX : Automated System Hardening Framework

GrapheneX is an automated system hardening framework. Although the current technology tries to design systems as safe as possible, security flaws and...
PEpper : An Open Source Script To Perform Malware Static Analysis On Portable Executable

PEpper : An Open Source Script To Perform Malware Static Analysis...

PEpper is an open source tool to perform malware static analysis on Portable Executable. Following are some of the features supported by the tool;
TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

TOR Router : A Tool That Allow You To Make TOR...

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only...
Dow Jones Hammer : Protect The Cloud With The Power Of The Cloud(AWS)

Dow Jones Hammer : Protect The Cloud With The Power Of...

Dow Jones Hammer is a multi-account cloud security tool for AWS. It identifies misconfigurations and insecure data exposures within most popular AWS...
WAF-Buster

WAF-Buster : Disrupt WAF by abusing SSL/TLS Ciphers

WAF-buster tool was created to Analyze the ciphers that are supported by the Web application firewall being used at the web server end. It...