Friday, December 6, 2019
Home Tags Protocol attacks

Tag: protocol attacks

Must Need

HeapHopper

HeapHopper – A Bounded Model Checking Framework For Heap-Implementations

HeapHopper is a bounded model checking framework for Heap-implementation.  HeapHopper Setup sudo apt update && sudo apt install build-essential python-dev virtualenvwrapper git clone https://github.com/angr/heaphopper.git && cd ./heaphopper mkvirtualenv...
Google Play Store

Malicious Apps Change Their Name To Be Back On Google Play...

The Google Play Store has a notoriety for being the most secure place online to get Android applications, and Google completes a great job...
Electronegativity

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in...

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can...
RemoteRecon

RemoteRecon – Remote Recon and Collection

RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose your complete toolkit/agent. Often times as operator's we need...
CGPwn

CGPwn – Ubuntu VM For Hardware Hacking, RE and Wargaming

CGPwn is a lightweight VM for hardware hacking, RE (fuzzing, symEx, exploiting etc) and wargaming task. Tools included in CGPwn; Fire up the VM git clone https://github.com/0xM3R/cgPwn cd...
Free VPN

The Dark Side of Free VPNs – Things You Must Know

Internet privacy should be everyone’s main concern, whether you use the internet just use for social media or internet banking, you should...
XRay : Tool For Recon, Mapping & OSINT Gathering From Public Networks

XRay : Tool For Recon, Mapping & OSINT Gathering From Public...

XRay is a tool for network OSINT gathering, its goal is to make some of the initial tasks of information gathering...