Monday, January 20, 2020
Home Tags Node Application

Tag: Node Application

Must Need

Easysploit

Easysploit : Metasploit Automation Easier & Faster Than Ever

The laterst version of EasySploit v3.1, which makes Metasploit automation easier and faster than ever. Following are the new options...
Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis & Function Clustering

Firmware Slap : Discovering Vulnerabilities In Firmware Through Concolic Analysis &...

Firmware slap combines concolic analysis with function clustering for vulnerability discovery and function similarity in firmware. Firmware slap is built...
Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

Exist : Web App For Aggregating & Analyzing Cyber Threat Intelligence

EXIST is a web application for aggregating and analyzing CTI (cyber threat intelligence). It is written by the following software.

A Closer Look At The Brushless DC Electric Motor

The brushless DC electric motor (also known as BL motor, BLDC motor or electronically commutated motor) is one of the synchronous motors that are...
Turbolist3r : Subdomain Enumeration Tool With Analysis Features For Discovered Domains

Turbolist3r : Subdomain Enumeration Tool With Analysis Features For Discovered Domains

Turbolist3r is a fork of the sublist3r subdomain discovery tool. In addition to the original OSINT capabilties of sublist3r, turbolist3r...
BackBox Linux 6.0 – Ubuntu-Based Linux Distribution Penetration Test & Security Assessment

BackBox Linux 6.0 – Ubuntu-Based Linux Distribution Penetration Test & Security...

BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments.
Cymothoa

Maintaining Access to a Linux Machine Using Cymothoa – Post Exploitation

Cymothoa is a post-exploitation tool. It can be used to maintain access to an exploited system. Cymothoa injects a variety of shellcodes to running...