Saturday, January 25, 2020
Home Tags Search Engines

Tag: Search Engines

Must Need

SecLists

SecLists : Security Tester’s Companion For Security Assessments

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in...
SILENTTRINITY

SILENTTRINITY – A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET

SILENTTRINITY is a post-exploitation agent powered by Python, IronPython, C#/.NET. SILENTTRINITY Requirements Server requires Python >= 3.7 SILENTTRINITY C# implant requires .NET >= 4.5 Also ReadAutoRDPwn...
Pwndb

Pwndb : Search For Leaked Credentials

Pwndb is a python command-line tool for searching leaked credentials using the Onion service with the same name.
Osmedeus  – Fully Automated Offensive Security Framework For Reconnaissance And Vulnerability Scanning

Osmedeus – Fully Automated Offensive Security Framework For Reconnaissance And...

Osmedeus is a fully automated offensive security framework for reconnaissance and vulnerability scanning Osmedeus allows you automated run the...
BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra, Medusa and Ncrack

BruteDum : Brute Force Attacks SSH, FTP, Telnet, PostgreSQL, RDP, VNC...

BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. It can work with any...
FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation Tool

FDSploit : File Inclusion & Directory Traversal Fuzzing, Enumeration & Exploitation...

FDSploit is a file Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool. It can be used to discover and exploit Local/Remote...
DjangoHunter

DjangoHunter : Tool To Identify Incorrectly Configured Django Applications

Djangohunter is a tool designed to help identify incorrectly configured Django applications that are exposing sensitive information. DjangoHunter Usage