Thursday, February 20, 2020
Home Tags Recon

Tag: recon

bluelog

Bluelog

Must Need

SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are...
Killcast

Killcast : Manipulate Chromecast Devices in your Network

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only, it shows...
Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of...
Vulners-Scanner

Vulners-Scanner : Vulnerability Scanner Based On Vulners.com Audit API

Vulners-Scanner is a PoC host-based vulnerability scanner, which uses vulners.com API. Detects operating system, collects installed packages and checks vulnerabilities in it. It currently...
Docker Security Playground : A Microservices-Based Framework For The Study Of Network Security & Penetration Test Techniques

Docker Security Playground : A Microservices-Based Framework For The Study Of...

Docker Security Playground is an application that allows you to: Create network and network security scenarios, in order to...
FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3, Powershell & .NET

FudgeC2 : A Collaborative C2 Framework For Purple-Teaming Written In Python3,...

FudgeC2 is a campaign orientated Powershell C2 framework built on Python3/Flask - Designed for team collaboration, client interaction, campaign timelining, and usage...
CTFTool : Interactive CTF Exploration Tool

CTFTool : Interactive CTF Exploration Tool

This is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used on Windows to implement Text Services....