Friday, December 6, 2019
Home Tags MEC

Tag: MEC

Must Need

Best Hacking Books

Best Hacking Books, Tools & Resources 2018

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...

theHarvester – Tool To Gather Email Address, Sub Domain and Hosts

“theHarvester Tool” is a simple and effective tool to gather the Email Address, Employee Names, Hostnames, Sub Domains, IP addresses, and Virtual Hosts, from...

smurf6

Perform a Smurf attack  and  a Distributed Denial of Service (DDoS) attack on a on whole IPv6 network using smurf6 Smurf6 is a tool to...
Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types...

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool...
Exrex

Exrex : Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular...
Wifite

Wifite 2.1.0 – Automated Wireless Attack Tool

A complete re-write of wifite, a Python script for auditing wireless networks. Wifite runs existing wireless-auditing tools for you. Stop memorizing command arguments & switches! What's...
Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...