Friday, December 13, 2019
Home Tags Rootless

Tag: Rootless

Must Need

Whatweb

whatweb – Tool to Discover Security Vulnerabilities With Your Web Application

Whatweb is the perfect name for this tool. Simply it answers the question, “What is that Website?” Whatweb can identify all sorts of information...
Thc Hydra : Tool To Gain Unauthorised Access From Remote To A System

Thc Hydra : Tool To Gain Unauthorised Access From Remote To...

Number one of the biggest security holes are passwords, as every password security study shows. Thc Hydra is a proof of concept...
Xori

Xori : An Automation-Ready Disassembly & Static Analysis Library

Xori is an automation-ready disassembly and static analysis library that consumes shellcode or PE binaries and provides triage analysis data.
VXScan : Python3 Comprehensive Scanning Tool

VXScan : Python3 Comprehensive Scanning Tool

VXScan is a Python3 comprehensive scanning tool, mainly used for sensitive file detection (directory scanning and js leak interface), WAF/CDN identification, port...

TakeOver : Takeover Script Extracts CNAME Record Of All Subdomains At...

Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku,...
SDK-SMS-Stack

SDK-SMS-Stack : GSM Short Message Service Provided with TPC/IP Based Characteristics

SDK-SMS-Stack is a Framework to provided TPC/IP based characteristics to the GSM Short Message Service. This framework works in...
MongoBuster

MongoBuster : Hunt Open MongoDB Instances

MongoBuster is a hunt open mongoDB instances. Following are the features that are associated with this. Worlds fastest and...