Sunday, February 23, 2020
Home Tags Risk Scanning

Tag: Risk Scanning

Must Need

Network Attacker

Network Attacker : WiFi Stress Testing Beacon Flooding & De-authentication Attack

Network Attacker V0.1 is a Wifi Stress Testing Bash Script Program Based on Mdk3 Beacon Flooding & Deauthentication Attack.  This was created to help...
DSSS – Damn Small SQLi Scanner

DSSS – Damn Small SQLi Scanner

DSSS (Damn Small SQLi Scanner) is a fully functional SQL injection vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of...
WiFi-Pumpkin

WiFi-Pumpkin – Framework for Rogue Wi-Fi Access Point Attack

WiFi-Pumpkin is an extremely total system for evaluating Wi-Fi security. The fundamental feature is the capacity to make a phony AP and make Man...
Droidefense

Droidefense : Advance Android Malware Analysis Framework

Droidefense is the codename for android apps/malware analysis/reversing tool. It was built focused on security issues and tricks that malware researcher have...
Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System

Whonix : Privacy Protection, Anonymity Online, Anonymous Operating System

Whonix is a free and open-source desktop operating system (OS) that is specifically designed for advanced security and privacy. Based on Tor,...
DNS-Shell

DNS-Shell : An Interactive Shell Over DNS Channel

DNS-Shell is an interactive Shell over DNS channel. The server is Python based and can run on any operating system that...
DVHMA

DVHMA – Damn Vulnerable Hybrid Mobile Application

Damn Vulnerable Hybrid Mobile App or DVHMA is a hybrid mobile app for Android that deliberately contains vulnerabilities. Its motivation is to empower security...