Thursday, May 13, 2021
Home Tags Vulnerabilities Database

Tag: Vulnerabilities Database

Must Need

XCTR Hacking Tools 2020

XCTR Hacking Tools 2020

XCTR Hacking Tools initially, you need to create a project where you will save everything. All of the collected information is...
Vba2Graph

Vba2Graph – Generate Call Graphs From VBA Code For Easier Analysis...

Vba2Graph is a tool for security researchers, who waste their time analyzing malicious Office macros. Generates a VBA call graph, with potential malicious keywords...
Kube-Hunter

Kube-Hunter:Hunt For Security Weaknesses In Kubernetes Clusters

Kube-hunter hunts for security weaknesses in Kubernetes clusters. The tool was developed to increase awareness and visibility for security issues in Kubernetes...
Getsploit

Getsploit v0.2.2 – Command Line Utility For Searching And Downloading Exploits

Getsploit allows you to search online for the exploits across all the most popular collections: Exploit-DB, Metasploit, Packetstorm and others. The most powerful feature...
How to Access Someone’s Text Messages Remotely

How to Access Someone’s Text Messages Remotely

Are you looking for an easy way to access someone’s text messages remotely? Do you feel your child or employees are sharing...
Windows 95

Windows 95 : Windows 95 in Electron That Runs on macOS,...

This is Windows 95, running in an Electron app, which runs on macOS, Linux, and Windows. Bear in mind that this is...
Two Step Authentication

Mozilla Adds Two Step Authentication Support For Firefox Accounts

Mozilla is propelling a Two Step Authentication process for supporting Firefox accounts. The authentication framework utilizes Firefox Sync usefulness to secure the synchronization of...