Saturday, July 11, 2020
Home Tags Spoofing

Tag: spoofing

fake_router6

Must Need

CuckooDroid

CuckooDroid – Automated Android Malware Analysis with Cuckoo Sandbox

CuckooDroid is an extension of Cuckoo Sandbox the Open Source software for automating analysis of suspicious files, CuckooDroid brigs to cuckoo the capabilities of...

BoomER : Framework For Exploiting Local Vulnerabilities

BoomER is an open source framework, developed in Python. The tool is focused on post-exploitation, with a main objective, the detection...
SALT

SALT – SLUB ALlocator Tracer for the Linux Kernel

Welcome to salt, a tool to reverse and learn kernel heap memory management. It can be useful to develop an exploit, to debug...
Fast Google Dorks Scan

Fast Google Dorks Scan

Fast Google Dorks Scan is a script to enumerate web-sites using Google dorks. Usage example: ./FGDS.sh megacorp.one
SecretFinder : A Python Script Based On LinkFinder

SecretFinder : A Python Script Based On LinkFinder

SecretFinder is a python script based on LinkFinder (version for burpsuite here), written to discover sensitive data like apikeys, accesstoken, authorizations, jwt,..etc...
SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’ Misconfigurations & Vulnerabilities Within Sudo

SUDO KILLER : A Tool To Identify & Exploit Sudo Rules’...

SUDO KILLER is a tool which help to abuse SUDO in different ways and with the main objective of performing a privilege...
WESNG :  Next Generation Windows Exploit Suggester

WESNG : Next Generation Windows Exploit Suggester

WESNG is a tool based on the output of Windows' systeminfo utility which provides the list of vulnerabilities the OS is...