Friday, December 13, 2019
Home Tags Radio Hacker

Tag: Radio Hacker

Must Need

WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting A Website

WAFw00f : Identify & Fingerprint Web Application Firewall (WAF) Products Protecting...

WAFW00F identifies and fingerprints Web Application Firewall (WAF) products. To do its magic, WAFW00F does the following: Sends a...
Man-in-the-middle

MITM : Man-in-the-middle Router

Turn any linux PC into an open Wi-Fi organize that quietly mitm or Man-in-the-middle all http activity. Keeps running inside a Docker container utilizing hostapd,...
Recaf

Recaf : A Modern Java Bytecode Editor

Recaf is an easy to use modern Java bytecode editor based on Objectweb's ASM. No more hassling with the constant pool...
BaseQuery  : A Way To Organize Public Combo-Lists And Leaks In A Way That You Can Easily Search Through Everything

BaseQuery : A Way To Organize Public Combo-Lists And Leaks...

BaseQuery is a way to organize public combo-lists and leaks in a way that you can easily search through everything.
Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File & Export x64dbg Database

Lst2x64dbg : Extract Labels From IDA .lst or Ghidra .csv File...

lst2x64dbg script extracts all the labels found in the LST file that is given as the script's single argument. An x64dbg...

How To Save Time With Automated Transcription Software

How To Save Time With Automated Transcription Software  Automated audio to text transcription tools are slowly becoming an integral part of office necessities. Today,...
SubDomain3: A New Generation Tool For Discovering Subdomains

SubDomain3: A New Generation Tool For Discovering Subdomains

Subdomain3 is a new generation of tool , It helps penetration testers to discover more information in a shorter time than other...