Wednesday, January 16, 2019
Home Tags Pixiewps

Tag: pixiewps

Must Need

Firebase – Tool To Exploiting Misconfigured Firebase Databases

Firebase exploiting tool is exploiting misconfigured firebase databases. Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...
Drozer

Drozer – Android Leading Security Testing Framework

Drozer (once in the past Mercury) is the main security testing framework for Android. It enables you to scan for security vulnerabilities in applications and...
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
nmap-bootstrap-xsl

Nmap-Bootstrap-XSL : A Nmap XSL implementation with Bootstrap

Nmap-Bootstrap-XSL is a  Nmap XSL implementation with Bootstrap. Nmap-Bootstrap-XSL Usage Add the nmap-bootstrap.xsl as stylesheet to your Nmap scan. Example: nmap -sS -T4 -A -sC -oA...
Vproxy

Vproxy – Forward HTTP/S Traffic To Proxy Instance

Vproxy tool is used to forward HTTP/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all...
Vba2Graph

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph, with potential malicious keywords...
GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...