Tuesday, November 12, 2019
Home Tags Mobile

Tag: Mobile

Must Need

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis : Security Auditing Tool for Unix/Linux Systems

Lynis is a security auditing tool for UNIX derivatives like Linux, macOS, BSD, Solaris, AIX, and others. It performs an in-depth security...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
Exrex

Exrex : Irregular Methods On Regular Expressions

Exrex is a command line tool and python module that generates all - or random - matching strings to a given regular...
Zeek : A Powerful Network Analysis Framework

Zeek : A Powerful Network Analysis Framework

Zeek is a powerful network analysis framework that is much different from the typical IDS you may know.
Chomp-Scan

Chomp-Scan : A Scripted Pipeline of Tools To Streamline The Bug...

Chomp-Scan is a scripted pipeline of tools to simplify the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs....
Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of...
DjangoHunter

DjangoHunter : Tool To Identify Incorrectly Configured Django Applications

Djangohunter is a tool designed to help identify incorrectly configured Django applications that are exposing sensitive information. DjangoHunter Usage