Thursday, July 9, 2020
Home Tags Linux

Tag: linux

Must Need

Pemcracker

Pemcracker – Tool to crack encrypted PEM files

Pemcracker is a tool to crack encrypted PEM files. This tool is inspired by pemcrack by Robert Graham. The purpose is to attempt to...
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...
PDF Over Word

7 Reasons Why You Should Use PDF Over Word

Nothing speaks about your professionalism more than using PDF file format while sending out the documents. Besides its' easy printable visuals and...
ProjectOpal : Stealth Post-Exploitation Framework For WordPress

ProjectOpal : Stealth Post-Exploitation Framework For WordPress

We intentionally made it for our penetration testing jobs however its getting grey hairs now so we thought we would like...
Nessus Map : Parse Nessus File(s) & Shows Output In Interactive UI

Nessus Map : Parse Nessus File(s) & Shows Output In Interactive...

Nessus Map parse .nessus file(s) and shows output in interactive User Interface. It just works by creating XML directory in Nessus_Map home...
IP-Biter

IP-Biter : The Hacker-friendly E-Mail Tracking Framework

IP-Biter is an open source, easy to deploy, tracking framework that generate high configurable and unique tracking images and links to embed in e-mails,...