Sunday, January 24, 2021
Home Tags Office365

Tag: Office365

Must Need

Hacking tools

Most Popular Hacking Tools in 2018

Hacking tools used by security professionals to detect vulnerabilities in network and applications. Here you can find the Comprehensive Penetration testing tools...
Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...
RSDL : Subdomain Scan With Ping Method

RSDL : Subdomain Scan With Ping Method

RSDL is a tool for subdomain Scan With Ping Method. FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the...
SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER : A Tool To Identify & Exploit Sudo Rules

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The...
Ossem Power Up : Tool To Assess Data Quality

Ossem Power Up : Tool To Assess Data Quality

Ossem Power Up is a tool to assess data quality, built on top of the awesome OSSEM project.
Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit Of Juice

Juicy Potato : A Sugared Version Of RottenPotatoNG, With A Bit...

Juicy Potato is a sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts...
HashCobra : Hash Cracking Tool

HashCobra : Hash Cracking Tool

HashCobra is a tool uses a new method to crack hashes. With the help of rainbow tables concept this tool generates rainbow...