Monday, January 20, 2020
Home Tags Threat Analysts

Tag: Threat Analysts

Must Need

DefectDojo

Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application...
Webtech

Webtech : Identify Technologies Used on Websites

We’re very proud to release WebTech as open-source software. WebTech is a Python software that can identify web technologies by visiting a...
Shelly : Simple Backdoor Manager With Python

Shelly : Simple Backdoor Manager With Python

Shelly adalah sebuah tool sederhana yang ditulis menggunakan Python, yang berfungsi untuk meremote sebuah website. Installation
RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To SAP

RFCpwn : An Enumeration & Exploitation Toolkit Using RFC Calls To...

RFCpwn is an SAP enumeration and exploitation toolkit using SAP RFC calls. This is a toolkit for demonstrating the impact of compromised...
SSRFmap

SSRFmap : Automatic SSRF Fuzzer And Exploitation Tool

SSRF are often used to leverage actions on other services, this framework aims to find and exploit these services easily. SSRFmap takes...
Metasploit getwlanprofiles

Metasploit getwlanprofiles – Simple Script To Download Wireless Profiles From...

Metasploit getwlanprofiles is a Meterpreter script which when kept running against Windows 7 or Vista boxes will extract and download all the wireless profiles...
Mutiny Fuzzer

Mutiny Fuzzer : Network Fuzzer Replaying PCAPs Through a Mutational Fuzzer

The Mutiny Fuzzer Framework is a network fuzzer that operates by replaying PCAPs through a mutational fuzzer. The goal is to...