Thursday, February 20, 2020
Home Tags LKWA

Tag: LKWA

Must Need

Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis & Function Clustering

Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis &...

Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built...
Pown : A Security Testing An Exploitation Toolkit Built

Pown : A Security Testing An Exploitation Toolkit Built

Pown (Pown.js) is a security testing and exploitation toolkit built on top of Node.js and NPM. Unlike traditional security tools like...
BaseQuery  : A Way To Organize Public Combo-Lists And Leaks In A Way That You Can Easily Search Through Everything

BaseQuery : A Way To Organize Public Combo-Lists And Leaks...

BaseQuery is a way to organize public combo-lists and leaks in a way that you can easily search through everything.
MozDef: Mozilla Enterprise Defense Platform

MozDef: Mozilla Enterprise Defense Platform

The inspiration for MozDef comes from the large arsenal of tools available to attackers. Suites like metasploit, armitage, lair, dradis and others...
Droid Hunter

Droid Hunter – Android Application Vulnerability Tool

Droid Hunter Android application vulnerability analysis and Android pentest tool. App info check Baksmaling android app Decompile android app Extract class file Extract java...
IPRotate : Extension For Burp Suite Which Uses AWS API Gateway To Rotate Your IP On Every Request

IPRotate : Extension For Burp Suite Which Uses AWS API Gateway...

IPRotate is a tool used for Burp Suite which uses AWS API Gateway to change your IP on every request. This extension...
Conpot

Conpot – ICS/SCADA Honeypot

Conpot is an ICS honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.