Monday, February 18, 2019
Home Tags Recon

Tag: recon

Must Need

Hooker

Hooker : Automated Dynamic Analysis of Android Applications

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
nmap-bootstrap-xsl

Nmap-Bootstrap-XSL : A Nmap XSL implementation with Bootstrap

Nmap-Bootstrap-XSL is a  Nmap XSL implementation with Bootstrap. Nmap-Bootstrap-XSL Usage Add the nmap-bootstrap.xsl as stylesheet to your Nmap scan. Example: nmap -sS -T4 -A -sC -oA...
Android Application

The Android Application Developer Guide: Converting an iOS App to Android

While an extensive variety of organizations may choose to send their mobile application only on the iOS platform first, many will do the change...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
XXRF Shots

XXRF Shots – Useful For Testing SSRF Vulnerability

XXRF Shots is useful for testing SSRF vulnerability. Server Side Request Forgery  or SSRF is a type of vulnerability class where attacker sends crafted...
libsodium

Libsodium – Easy To Use Software Library

Libsodium is a modern, portable, easy to use crypto library. Sodium is a new, easy-to-use software library for encryption, decryption, signatures, password hashing and more. It...

Joomla Vulnerability Component Scanner – JCS

JCS (Joomla Component Scanner) made for penetration testing reason on Joomla CMS JCS can help you with the most recent component vulnerabilities and endeavors....