Thursday, August 6, 2020
Home Tags Tor

Tag: Tor

Must Need

Lava : Large-scale Automated Vulnerability Addition

Lava : Large-scale Automated Vulnerability Addition

Evaluating and improving bug-finding tools is currently difficult due to a shortage of ground truth corpora (i.e., software that has known bugs...
How to Send a Fax Without a Phone Line? With Fax Online Service

How to Send a Fax Without a Phone Line? With Fax...

Most people today are unaware of what a fax is, leave alone how to operate a fax machine. Although it may seem...
Hindsight

Hindsight – Tool For Analyzing Web Artifacts Chrome Browser & Chromium-Based...

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded...

TakeOver : Takeover Script Extracts CNAME Record Of All Subdomains At...

Subdomain takeover is a class of vulnerability where subdomain points to an external service that has been deleted. The external services are Github, Heroku,...
Headless Burp

Headless Burp – Automate security tests using Burp Suite

Headless Burp provides an extension to Burp that allows you to run Burp Suite's Spider and Scanner tools in headless mode via command-line. However, it...
Why Some Canon Printers Are More Effective Than Others

Why Some Canon Printers Are More Effective Than Others

Not all printers are created equal and that is as true when it comes to comparing printers from the same manufacturer. If...
Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall : Firewall Framework Designed For Offensive & Defensive Cyber Professionals

Bluewall is a firewall framework designed for offensive and defensive cyber professionals. This framework allows Cybersecurity professionals to quickly setup their environment...