Thursday, June 4, 2020
Home Tags Sql

Tag: sql

Must Need

Air-Hammer

Air-Hammer – A Online Brute-Force Attack Tool

Air-Hammer is an online brute-force attack tool for use against WPA Enterprise networks. Despite the fact that WPA Enterprise is regularly viewed as "more...
Remote-Desktop-Caching

Remote-Desktop-Caching : Recover Old RDP (MSTSC) Session Information In The Form...

Remote-Desktop-Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team...
XenoScan

XenoScan – Open source memory scanner written in C++

XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These...
LdapDomainDump : Active Directory Information Dumper via LDAP

LdapDomainDump : Active Directory Information Dumper via LDAP

LDAPDomainDump is an Active Directory information dumper via LDAP. In an Active Directory domain, a lot of interesting information can be retrieved...
CVE-Search

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

CVE-Search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilitate search and processing...
Threadtear : Multifunctional Java Seobfuscation Tool Suite

Threadtear : Multifunctional Java Seobfuscation Tool Suite

Threadtear is a multifunctional deobfuscation tool for java. Android application support is coming soon (Currently working on a dalvik to java converter)....
wifiphisher

Wifiphisher Can Attack Wi-Fi By Unknowingly Connecting To An Attacker-Controlled Access...

Wifiphisher is a security device that performs Wi-Fi programmed affiliation attack to drive wireless customers to unwittingly interface with an attacker-controlled Access Point. It...