Wednesday, December 2, 2020
Home Tags Passwords

Tag: Passwords

Must Need

Sherloq : An Open-Source Digital Image Forensic Toolset

Sherloq : An Open-Source Digital Image Forensic Toolset

Sherloq is a personal research project about implementing a fully integrated environment for digital image forensics. It is not meant as an...
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
XML External Entity – XXE Injection Payload List

XML External Entity – XXE Injection Payload List

In this section, we'll explain what XML external entity injection is, describe some common examples, explain how to find and exploit...
Pentol

PENTOL – Pentester Toolkit for Fiddler2 2018

PENTOL is a pentester Toolkit is built as a plugin for the Fiddler HTTP debugging proxy. Pentol Features CORS DETECTED Cross-Origin Resource Sharing CRLF DETECTED...
Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File...

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg...
DefectDojo

Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application...
UACME :  Defeating Windows User Account Control

UACME : Defeating Windows User Account Control

UACMe is a defeating windows user account control by abusing built-in windows autoElevate backdoor. System Requirements