Saturday, April 20, 2019
Home Tags URH

Tag: URH

Must Need

DefectDojo

Django DefectDojo : Open-Source Application Vulnerability Correlation & Security Orchestration Tool

DefectDojo is a security program and vulnerability management tool. It allows you to manage your application security program, maintain product and application...
SilkETW

SilkETW : Tool To Abstract Away The Complexities Of ETW

SilkETW is a flexible C# wrapper for ETW, it is meant to abstract away the complexities of ETW and give people...

Burp Suite Extension – Turbo Intruder To Perform Security Testing on...

Turbo Intruder is a Burp Suite extension which is an integrated platform for performing security testing of web applications. It sends many...
Autovpn

Autovpn – Connect to a VPN in a Country of your...

AutoVpn is a tool to automatically connect you to a random VPN in a country of your choice. It uses openvpn to connect you...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop shop for all of...
Leaked

Leaked 2.0 – A Checking tool for Hash codes, Passwords and...

Leaked 2.0 is A Checking tool for Hash codes and Passwords and Emails leaked, uses leakz module from Aidan Holland, and leakz module uses...

smurf6

Perform a Smurf attack  and  a Distributed Denial of Service (DDoS) attack on a on whole IPv6 network using smurf6 Smurf6 is a tool to...