Wednesday, March 20, 2019
Home Tags SAM

Tag: SAM

Must Need

Adapt

Adapt : A Tool To Performs Automated Penetration Testing for WebApps

ADAPT is a tool that performs Automated Dynamic Application Penetration Testing for web applications. It is designed to increase accuracy, speed,...
GatherContacts

GatherContacts – A Burp Suite Extension To Pull Employee Names From...

GatherContacts is a Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results. As part of reconnaissance when performing a penetration...
Pwned

Pwned – A Command-Line Tool For Querying The ‘Have I been...

A command-line tool for querying Troy Hunt's Have I been pwned ? service using the hibp Node.js module. Pwned Installation Download and install Node.js, then install...
Leaked

Leaked – A Checking Tool For Hash Codes And Passwords Leaked

A checking tool for hash codes and passwords leaked. It can work in any OS if they have support Python 3. Leaked Features Check passwords ...
burpsuite

Burpsuite – A Beginner’s Guide For Web Application Security or Penetration...

Burpsuite is a collection of tools bundled into a single suite made for Web Application Security or Penetration testing. It's a java executable and...
attack

World Wide Live Attack Map & Analytics

Ever wanted to see live DOS attacks across the globe ? There is a website from a security firm which shows live attacks from...

Orbit – Draws Relationships Between Crypto Wallets Using Recursive Crawling

Orbit draws relationships between crypto wallets using recursive crawling. Give it a blockchain based crypto wallet address and it will crawl 3 levels deep...