Sunday, December 15, 2019
Home Tags SHA

Tag: SHA

Must Need

RecScanSec – Reconnaisance Scanner Security

RecScanSec – Reconnaisance Scanner Security

RecScanSec made for reconnaisance Scanner and information gathering with an emphasis on simplicity. Following are the features of the scanner; Information...
Frisky

Frisky – Tools To Assist Binary App Reversing & Augmentation

Frisky is an instruments to assist in binary application reversing and augmentation, geared towards walled gardens like iOS. Most, if not all, recently tested...
Cloudmapper

Cloudmapper – Tool Helps To Analyze Your AWS Environments

CloudMapper helps you analyze your Amazon Web Services (AWS) environments. The original purpose was to generate network diagrams and display them in your browser....
Nuages : A Modular C2 Framework 2019

Nuages : A Modular C2 Framework 2019

Nuages aims at being a C2 framework in which back end elements are open source, whilst implants and handlers must be developed...

Burp Suite Extension – Turbo Intruder To Perform Security Testing on...

Turbo Intruder is a Burp Suite extension which is an integrated platform for performing security testing of web applications. It sends many...
Unicorn-Bios : Basic BIOS Emulator for Unicorn Engine

Unicorn-Bios : Basic BIOS Emulator for Unicorn Engine

Unicorn-Bios is a basic BIOS emulator/debugger for Unicorn Engine. Usage Usage: unicorn-bios BOOT_IMGOptions:...
XAttacker

XAttacker – Website Vulnerability Scanner & Auto Exploiter Tool

XAttacker is a is a perl website tool to vulnerability scanner & auto exploiter, which you can use to find vulnerability in your website...