Sunday, January 19, 2020
Home Tags Technologies

Tag: Technologies

Must Need

Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

Osmedeus : Security Framework For Reconnaissance & Vulnerability Scanning

Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target.
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy : Exploit Time-Based Blind-SQL Injection In HTTP-Headers

Blisqy is a tool to aid Web Security researchers to find Time-based Blind SQL injection on HTTP Headers and also exploitation of...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
PostShell – Post Exploitation Bind/Backconnect Shell

PostShell – Post Exploitation Bind/Backconnect Shell

PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which...
Github Dorks :  Collection of Github Dorks & Helper Tool

Github Dorks : Collection of Github Dorks & Helper Tool

Github search is quite powerful and useful feature and can be used to search sensitive data on the repositories. Collection...
IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract : Advanced Indicator Of Compromise (IOC) Extractor

IOCExtract is an advanced Indicator of Compromise (IOC) extractor. This library extracts URLs, IP addresses, MD5/SHA hashes, email addresses, and YARA rules...