Saturday, June 6, 2020
Home Tags Security analysis

Tag: security analysis

Must Need

NETworkManager

NETworkManager – A Powerful Tool For Managing Networks & Troubleshoot Network...

NETworkManager is a powerful tool for managing networks and troubleshoot network problems. Let us have a look on the features on the...
Best Hacking Books

Best Hacking Books, Tools & Resources 2018

The mystery of turning into a superior infiltration analyzer, bug abundance seeker or IT proficient is to center around pentesting books as well as...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part of the THC-IPv6 tools...
ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch, Termux, Android...
Best Way to Learn Programming Online If You’re Tired of Books and Tutors

Best Way to Learn Programming Online If You’re Tired of Books...

Today programming is taking the reins of the world's labor market. Ever developing, much promising and forward-looking, it's really worthwhile learning and...
Sticky Keys Hack

WinPirate – Automated Sticky Keys Hack

We create a way to automate doing the window sticky keys hack from a bootable USB. Then, we automate getting as many saved passwords...