Friday, December 6, 2019
Home Tags Mutiny Fuzzer

Tag: Mutiny Fuzzer

Must Need

Robber

Robber : Tool For Finding Executables Prone To DLL Hijacking

Robber is a free open source tool developed using Delphi XE2 without any 3rd party dependencies. So What Is DLL Hijacking? Windows has a search path...
Joomscan

Joomscan – OWASP Joomla Vulnerability Scanner Project

OWASP Joomla! Vulnerability ScannerĀ  or JoomScan is an open source project, developed with the aim of automating the task of vulnerability detection and reliability...
Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File...

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg...
Metame : Metamorphic Code Engine For Arbitrary Executables

Metame : Metamorphic Code Engine For Arbitrary Executables

Metame is a simple metamorphic code engine for arbitrary executable. Metamorphic code is code that when run outputs a logically equivalent version...
CloudBunny

CloudBunny – CloudBunny Is A Tool To Capture The Real IP...

CloudBunny is a tool to capture the real IP of the server that uses a WAF as a proxy or protection. In this tool...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
Malwoverview

Malwoverview – Tool To Perform An Initial & Quick Triage On...

Malwoverview is a first response tool to perform an initial and quick triage on either a directory containing malware samples or a specific malware...