Wednesday, July 28, 2021
Home Tags Network Flow

Tag: Network Flow

Must Need

GitJacker : Leak Git Repositories From Misconfigured Websites

GitJacker : Leak Git Repositories From Misconfigured Websites

Gitjacker downloads git repositories and extracts their contents from sites where the .git directory has been mistakenly uploaded. It will still manage...
AWS Report – Tool For Analyzing Amazon Resources

AWS Report – Tool For Analyzing Amazon Resources

AWS Report is a tool for analyzing amazon resources, let us have a look at some of features; Search...
MapCIDR : Small Utility Program To Perform Multiple Operations For A Given sub-net/CIDR Ranges

MapCIDR : Small Utility Program To Perform Multiple Operations For A...

MapCIDR is a small utility program to perform multiple operations for a given subnet/CIDR ranges. The tool was developed...
IRFuzz : Simple Scanner with Yara Rules

IRFuzz : Simple Scanner with Yara Rules

IRFuzz is a simple scanner with yara rules for document archives or any files. Install

How To Save Time With Automated Transcription Software

How To Save Time With Automated Transcription Software  Automated audio to text transcription tools are slowly becoming an integral part of office necessities. Today,...
GoldenEye : GoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye : GoldenEye Layer 7 (KeepAlive+NoCache) DoS Test Tool

GoldenEye is an python app for SECURITY TESTING PURPOSES ONLY! GoldenEye is a HTTP DoS Test Tool.
RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 : JWT Attack To Change Algorithm RS256 to HS256

RS256-2-HS256 is a JWT Attack to change the algorithm RS256 to HS256. Usage Usage:...