Thursday, July 16, 2020
Home Tags Layer 2 attacks

Tag: layer 2 attacks

dnsniff macof

macof

Must Need

DNSDmpstr

DNSDmpstr : Unofficial API & Client for DnsDumpster & HackerTarget

DNSDmpstr is an unofficial API & Client for DNS Dumpster and HackerTarget.com IP tools. DNS dumpster is a FREE...
Pompem

Pompem : Tool For Exploits & Vulnerability in Database

Pompem is an open source tool, designed to automate the search for Exploits and Vulnerability in the most important databases....

Burp Extensions – Burp Suite Extensions For The New Burp Suite...

Burp Extensions collection of extensions for the new Burp Suite API (v1.5+) using Submodules for easy collection and updating. If you want to add...
HashCracker : Python Hash Cracker

HashCracker : Python Hash Cracker

HashCracker is a python hash cracker which support hashing algorithms like SHA512, SHA256, SHA384, SHA1, MD5, SHA224.
CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse Attacks

CrauEmu : uEmu Extension For Developing & Analyzing Payloads For Code-Reuse...

crauEmu is an uEmu extension for developing and analyzing payloads for code-reuse attacks. Installation
Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host

Powershell-Reverse-TCP : PowerShell Script For Connecting To A Remote Host

PowerShell script for connecting to a remote host. Remote host will have full control over client's PowerShell and all its underlying commands.
How to Protect Yourself Against Common Password Attacks

How to Protect Yourself Against Common Password Attacks

To avoid password attacks, Authentication and access management may be evolving, but passwords are not going to disappear in the near future....