Wednesday, July 8, 2020
Home Tags Protocol

Tag: protocol

Must Need

imago

imago Forensics : A Python Tool That Extract Digital Evidences From...

Imago is a python tool that extract digital evidences from images recursively. This tool is useful throughout a digital forensic investigation. If...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
HawkEye

Hawkeye – A Tool To Crawl The Filesystem Or A Directory

HawkEye is a simple tool to crawl the filesystem or a directory looking for interesting stuff like SSH Keys, Log Files, Sqlite Database, password...
Curate

Curate – A tool for fetching archived URLs

Curate is a tool for fetching archived URLs and to be rewritten in Go. Curate Initial set-up one-liner This will clone this repository and then move...
Andor : Blind SQL Injection Tool With Golang

Andor : Blind SQL Injection Tool With Golang

Andor is a blind SQL Injection Tool with Golang. Also Read -...
WPBullet : A Static Code Analysis For WordPress & PHP

WPBullet : A Static Code Analysis For WordPress & PHP

WPBullet is a static code analysis for WordPress Plugins/Themes (and PHP). Simply clone the repository, install requirements and run the...
Axiom : A Dynamic Infrastructure Toolkit For Red Teamers & Bug Bounty Hunters

Axiom : A Dynamic Infrastructure Toolkit For Red Teamers & Bug...

Project Axiom is a set of utilities for managing a small dynamic infrastructure setup for bug bounty and pentesting.