Monday, March 30, 2020
Home Tags OSINT

Tag: OSINT

Must Need

Attack Range  : Tool To Simulate Attacks Against & Collect Data Into Splunk

Attack Range : Tool To Simulate Attacks Against & Collect...

Attack Range is a tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against...

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors....
Nipe

Nipe- Script To Make Tor Network Your Default Gateway

Nipe is a script to make Tor Network your default gateway. Nipe is a script for Linux that adjusts iptables to course all activity...
FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation...

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote...
GoDoH : A DNS-Over-HTTPS C2

GoDoH : A DNS-Over-HTTPS C2

GoDoH is a proof of concept Command and Control framework, written in Golang, that uses DNS-over-HTTPS as a transport medium. Currently supported...
Hatch

Hatch – Brute Force Tool That Is Used To Brute Force...

Hatch is a brute force tool that is used to brute force most websites. In order to use the this tool...
XSS-Payload-List

XSS-Payload-List : Cross Site Scripting ( XSS ) Vulnerability Payload List

XSS-Payload-List or Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected into otherwise benign and trusted web sites....