Saturday, November 16, 2019
Home Tags Network

Tag: network

Must Need

Blind-Bash

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide...
Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
Youzer : Fake User Generator For Active Directory Environments

Youzer : Fake User Generator For Active Directory Environments

Fake User Generator for Active Directory Environments. The goal of Youzer is to create information rich Active Directory environments. This uses the python3...
Donut : Generates x86, x64, or AMD64+x86 Position-Independent Shellcode

Donut : Generates x86, x64, or AMD64+x86 Position-Independent Shellcode

Donut generates x86 or x64 shellcode from VBScript, JScript, EXE, DLL (including .NET Assemblies) files. This shellcode can be injected into...
Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...
Raptor WAF

Raptor WAF – Web application firewall using DFA

Raptor WAF is a Open Source Web application firewall tool made in C, utilizes DFA to block SQL infusion, Cross website scripting and way traversal. It...
Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security Issues Outside The Source Code

Truegaze : Static Analysis Tool For Android/iOS Applications Focusing On Security...

Truegaze is a static analysis tool for Android and iOS applications focusing on security issues outside the source code such as resource...