Friday, July 23, 2021
Home Tags Uac-a-mola

Tag: Uac-a-mola

Must Need

Kali Linux 2019.4 – Penetration Testing & Ethical Hacking Linux Distribution

Kali Linux 2019.4 Released – New Version of Penetration Testing &...

We are very excited to announce our 2019 fourth and final release, Kali Linux 2019.4, which can be downloaded immediately. This brings...
Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...
Ponce : IDA Pro Plugin That Provides Users The Ability To Perform Taint Analysis & Symbolic Execution

Ponce : IDA Pro Plugin That Provides Users The Ability To...

Ponce is an IDA Pro plugin that provides users the ability to perform taint analysis and symbolic execution over binaries in...
Impost3r : A Linux Password Thief

Impost3r : A Linux Password Thief

Impost3r is a tool that aim to steal many kinds of linux passwords(including ssh,su,sudo) written by C.Attackers can use Impost3r to make...
DVR-Exploiter

DVR-Exploiter : DVR-Exploiter a Bash Script Program Exploit The DVR’s

DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-999.  Exploit Title: DVR Credentials Exposed Date:...
Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It supports calls...

Get Sassy About SASE – Avoid The Dangers of Watering Hole...

During the dry season on the plains of Africa, water is scarce. Wild animals will flock to any place where they can...