Sunday, January 19, 2020
Home Tags Security Assessments

Tag: Security Assessments

Must Need

Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph Theory

Pown Recon : A Powerful Target Reconnaissance Framework Powered By Graph...

Pown Recon is a target reconnaissance framework powered by graph theory. The benefit of using graph theory instead of flat table...
BootStomp

BootStomp – A Bootloader Vulnerability Bug Finder

BootStomp is a tool to boot-loader vulnerability bug finder. It will look different for two different class of bugs: memory corruption and state storage...
Termshark : A Terminal UI For Tshark

Termshark : A Terminal UI For Tshark

Termshark is a terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a...

Ten Benefits of Writing Jobs That May Change Your Perspective

Writing is a great way to express yourself and at the same time, earn a living. When you have the right perspective...
PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite : Network Pivoting Toolkit To Hack The Hidden Network

PivotSuite is a portable, platform independent and powerful network pivoting toolkit, Which helps Red Teamers / Penetration Testers to use a compromised...
LOLBAS

LOLBAS – Living Off The Land Binaries And Scripts

LOLBAS is the living off the land binaries and scripts. All the different files can be found behind a fancy frontend...
Electronegativity

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in...

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications. Software developers and security auditors can...