Wednesday, October 16, 2019
Home Tags Sql

Tag: sql

Must Need

CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
BurpBounty

BurpBounty – Active and Passive Scan Check Builder

BurpBounty permits you, in a speedy and basic way, to enhance the active and passive burpbounty suite scanner by methods for customized rules through...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...
Fern Wifi Cracker

Fern Wifi Cracker For Wireless Security

Fern Wifi Cracker is a Wireless security evaluating and assault software program composed utilizing the Python Programming Language and the Python Qt GUI library,...
Sampler : A Tool For Shell Commands Execution, Visualization & Alerting

Sampler : A Tool For Shell Commands Execution, Visualization & Alerting

Sampler is a tool for shell commands execution, visualization and alerting. Configured with a simple YAML file. One can...
Hostintel

Hostintel : A Modular Python App to Collect Intelligence for Malicious...

Hostintel is used to collect various intelligence sources for hosts. Hostintel is written in a modular fashion so new intelligence sources can...