Monday, July 13, 2020
Home Tags Log

Tag: Log

Must Need

Two Step Authentication

Mozilla Adds Two Step Authentication Support For Firefox Accounts

Mozilla is propelling a Two Step Authentication process for supporting Firefox accounts. The authentication framework utilizes Firefox Sync usefulness to secure the synchronization of...
DbgShell

DbgShell – A PowerShell Front-End For The Windows Debugger Engine

DbgShell a PowerShell front-end for the Windows debugger engine. DbgShell Inducement Have you ever tried automating anything in the debugger? (cdb/ntsd/kd/windbg) How did that go for...
DNS-Shell

DNS-Shell : An Interactive Shell Over DNS Channel

DNS-Shell is an interactive Shell over DNS channel. The server is Python based and can run on any operating system that...
hackbar

HackBar : HackBar plugin for Burpsuite v1.0

HackBar is a java based Burpsuite Plugin. It is tested and working perfectly on Burpsuite 1.7.36, Windows 10 and xubuntu 18.04. In order to...
Versionscan : A PHP Version Scanner For Reporting Possible Vulnerabilities

Versionscan : A PHP Version Scanner For Reporting Possible Vulnerabilities

Versionscan is a tool for evaluating your currently installed PHP version and checking it against known CVEs and the versions they were...
Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...
Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics & Threat Hunting

Tylium : Primary Data Pipelines For Intrusion Detection, Security Analytics &...

Tylium is a primary data pipelines for intrusion detection, security analytics and threat hunting. These files contain configuration for producing EDR...