Sunday, April 11, 2021
Home Tags Linux

Tag: linux

Must Need

Axiom : A Dynamic Infrastructure Toolkit For Red Teamers & Bug Bounty Hunters

Axiom : A Dynamic Infrastructure Toolkit For Red Teamers & Bug...

Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.
Nameles

Nameles – Open Source Entropy Based Invalid Traffic Detection & Pre-bid...

Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of accuracy ad...
XMLRPC : An Brute Forcer Targeting WordPress Written In Python 3

XMLRPC : An Brute Forcer Targeting WordPress Written In Python 3

An XMLRPC brute forcer targeting Wordpress written in Python 3. In the context of xmlrpc brute forcing, its faster than Hydra and...
XML External Entity – XXE Injection Payload List

XML External Entity – XXE Injection Payload List

In this section, we'll explain what XML external entity injection is, describe some common examples, explain how to find and exploit...
Lockphish : The First Tool For Phishing Attacks

Lockphish : The First Tool For Phishing Attacks

Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone...
QRLJacking : Hijack Services That Relies On QR Code Authentication

QRLJacking : Hijack Services That Relies On QR Code Authentication

QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that...
Freki : Malware Analysis Platform

Freki : Malware Analysis Platform

Freki is a free and open-source malware analysis platform. Goals Facilitate malware analysis and reverse...