Friday, April 10, 2020
Home Tags Post

Tag: post

Must Need

Firebase – Tool To Exploiting Misconfigured Firebase Databases

Firebase exploiting tool is exploiting misconfigured firebase databases. Disclaimer: The provided software is meant for educational purposes only. Use this at your own discretion, the...
RedPeanut : Small RAT Developed in .Net Core 2 & Its Agent in .Net 3.5 / 4.0

RedPeanut : Small RAT Developed in .Net Core 2 & Its...

RedPeanut is a small RAT developed in .Net Core 2 and its agent in .Net 3.5 / 4.0. RedPeanut code execution is...

Trape – People Tracker On The Internet

Trape is a OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created...
CTF

CTF – Some Setup Scripts For Security Research Tools

CTF is a collection of setup scripts to create an install of various security research tools. Of course, this isn't a hard problem, but...
Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini – Free Android APK & API Vulnerability Scanner

Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any...
Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban scans log files like /var/log/auth.log and bans IP addresses conducting too many failed login attempts. It does this by updating system firewall rules...
TOR Router : A Tool That Allow You To Make TOR Your Default Gateway

TOR Router : A Tool That Allow You To Make TOR...

Tor Router allow you to use TOR as a transparent proxy and send all your traffic under TOR INCLUDING DNS REQUESTS, the only...