Wednesday, September 23, 2020
Home Tags Recon

Tag: recon

bluelog

Bluelog

Must Need

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...
B-XSSRF : Toolkit To Detect & Keep Track On Blind XSS, XXE & SSRF

B-XSSRF : Toolkit To Detect & Keep Track On Blind XSS,...

B-XSSRF is a toolkit to detect and keep track on Blind XSS, XXE & SSRF.
AutoSploit : Automated Mass Exploiter

AutoSploit : Automated Mass Exploiter

As the name might suggest AutoSploit attempts to automate the exploitation of remote hosts. Targets can be collected automatically through...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
Business Secure: How AI is Sneaking into our Restaurants

Business Secure: How AI is Sneaking into our Restaurants

Prior to pandemic days, the restaurant industry talked of computers that might end up taking over their daily responsibilities. They’d joke about...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python...

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an...
Saferwall : An Open Source Malware Analysis Platform

Saferwall : An Open Source Malware Analysis Platform

Saferwall is an open source malware analysis platform. It aims for the following goals: Provide a collaborative platform to...