Thursday, July 29, 2021
Home Tags OWTF

Tag: OWTF

Must Need

Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In Multiple Types Of CMS

Vulnx : Intelligent Bot Auto Shell Injector That Detect Vulnerabilities In...

Vulnx is An Intelligent Bot Auto Shell Injector that detect vulnerabilities in multiple types of CMS, fast cms detection,information gathering and vulnerabilities...
Just-Metadata

Just-Metadata : Tool That Gathers & Analyzes Metadata About IP Addresses

Just-Metadata is a tool that can be used to gather intelligence information passively about a large number of IP addresses, and...
A List Of Services & How To Claim Subdomain With Dangling DNS Records

A List Of Services & How To Claim Subdomain With Dangling...

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed...
PowerUpSQL

PowerUpSQL Tool kit to Audit SQL Server for Weak Configuration Auditing,...

PowerUpSQL includes functions that support SQL Server discovery, weak configuration auditing, privilege escalation on the scale, and post exploitation actions such as OS command...
thc-ssl-dos

THC-SSL-DOS – DoS Tool Against Secure Web-Servers and for Testing SSL-Renegotiation

THC is The Hacker's Choice. They are a group of hackers from Germany. Thc-SSL-dos is used for checking whether a website or server is...
AutoSploit : Automated Mass Exploiter

AutoSploit : Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through...
Red-Shadow : Lightspin AWS IAM Vulnerability Scanner

Red-Shadow : Lightspin AWS IAM Vulnerability Scanner

Red-Shadow is a tool for Lightspin AWS IAM Vulnerability Scanner. Scan your AWS IAM Configuration for shadow admins in...