Friday, August 23, 2019
Home Tags Reverse Engineering

Tag: Reverse Engineering

Must Need

Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
Dissertation

How to Write a Dissertation in Less Time Than You Plan

Let's face it. Many students have problems with an adequate estimate of time. When it comes to a particularly difficult task, the...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer : Create Actionable Data From Your Vulnerability Scans

VulnWhisperer is a vulnerability management tool and report aggregator. VulnWhisperer will pull all the reports from the different Vulnerability scanners and create...
Linux Smart Enumeration : Tool For Pentesting & CTFs With Verbosity Levels

Linux Smart Enumeration : Tool For Pentesting & CTFs With Verbosity...

Linux Smart Enumeration is a tool for pentesting and CTFs with verbosity levels. This script will show relevant information about the...
SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout