Thursday, October 17, 2019
Home Tags Security analysis

Tag: security analysis

Must Need

LeakLooker

LeakLooker : Find open databases with Shodan

LeakLooker can be used to find open MongoDB, CouchDB and Elasticsearch database, it also includes Kibana instances. Script parses results from Shodan,...
Reload.sh

Reload.sh : Reinstall, Restore & Wipe Your System Via SSH, Without...

Reload.sh is a tool to reinstall, restore and wipe your system from the level and in the place of the running...
Androl4b

Androl4b – Android Security Virtual Machine

AndroL4b is an android security virtual machine in view of ubuntu-mate incorporates the gathering of most recent framework, tutorials and labs from various security...
TrigMap : A Wrapper For Nmap To Automate The Pentest

TrigMap : A Wrapper For Nmap To Automate The Pentest

Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect information into a...
onion

Onion nmap To Scan Hidden Onion Services

Utilize nmap to scan hidden "onion" benefits on the Tor network. Insignificant picture in view of elevated, utilizing proxychains to wrap nmap. Tor and...
IDArling

IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray

IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database...
PHPMussel

PHPMussel : Anti-Virus Anti-Trojan Anti-Malware Solution

An ideal solution for shared hosting environments, where it's often not possible to utilise or install conventional anti-virus protection solutions,...