Thursday, June 27, 2019
Home Tags ModSecurity

Tag: ModSecurity

Must Need

DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...
GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names From An Organisation

CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names From...

CrossLinked simplifies the processes of searching LinkedIn to collect valid employee names when performing password spraying or other security testing against an...
Best Hacking Books

Best Hacking Books, Tools & Resources 2018

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...
BeRoot

BeRoot – Tool To Check Common Windows Mis-configurations

BeRoot is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege. It will be added to...
Two Step Authentication

Mozilla Adds Two Step Authentication Support For Firefox Accounts

Mozilla is propelling a Two Step Authentication process for supporting Firefox accounts. The authentication framework utilizes Firefox Sync usefulness to secure the synchronization of...
WebMap

WebMap : Nmap Web Dashboard and Reporting

WebMap project is designed to run on a Docker container With Nmap Web Dashboard . IMHO it isn't a good idea to run this...