Friday, November 15, 2019
Home Tags Peda

Tag: Peda

Must Need

Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...
Hvazard : Remove Short Passwords & Duplicates, Change Lowercase To Uppercase & Reverse, Combine Wordlists

Hvazard : Remove Short Passwords & Duplicates, Change Lowercase To Uppercase...

HVAZARD dictionary modifier remove short passwords & duplicates, change lowercase to uppercase & reverse, combine wordlists! Manual &...
SocialFish

SocialFish : Educational Phishing Tool & Information Collector

An app to remote control SocialFish. This app is an open-source project to remote control the application, it does not work independently....
SQL Injection Tools

List of Best Open Source SQL Injection Tools – 2018

SQL injection is a standout amongst the most widely recognized attacks against web applications. Here is the list of Best SQL Injection Tools 2018. Its...
FakeImageExploiter

Use a Fake image.jpg ‘FakeImageExploiter’ to Exploit Targets

FakeImageExploiter stores all records in apache2 webroot, zips (.zip) the specialist, begins apache2 and metasploit services(handler), and gives a URL to send to target...
UBoat : HTTP Botnet Project

UBoat : HTTP Botnet Project

UBoat is a POC HTTP Botnet designed to replicate a full weaponised commercial botnet. What is a Botnet...
VXScan : Python3 Comprehensive Scanning Tool

VXScan : Python3 Comprehensive Scanning Tool

VXScan is a Python3 comprehensive scanning tool, mainly used for sensitive file detection (directory scanning and js leak interface), WAF/CDN identification, port...