Wednesday, May 12, 2021
Home Tags Vulnerabilities

Tag: Vulnerabilities

Must Need

WiFiJammer

WiFiJammer – Continuously Jam All Wi-Fi Clients/Routers

WiFiJammer continuously jam all wifi clients and access points within range. The effectiveness of this script is constrained by your wireless card. Alfa cards...
Subfinder : A Subdomain Discovery Tool To Find Valid Websites Subdomains

Subfinder : A Subdomain Discovery Tool To Find Valid Websites Subdomains

Subfinder is a subdomain discovery tool that discovers valid subdomains for websites by using passive online sources. It has a simple...

PasteJacker : Hacking Systems With The Automation Of PasteJacking Attacks

PasteJacker the main purpose of the tool is automating (PasteJacking/Clipboard poisoning/whatever you name it) attack with collecting all the known tricks used in this...
Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

Airflowscan : Checklist & Tools For Increasing Security Of Apache Airflow

Airflowscan is a checklist and tools for increasing security of Apache Airflow. The purpose of this project is provide tools to increase...

Triton – Dynamic Binary Analysis (DBA) Framework

Triton is a Dynamic Binary Analysis (DBA) framework. It provides internal components like a Dynamic Symbolic Execution (DSE) engine, a Taint Engine, AST representations...
Kubolt : Utility For Scanning Public Kubernetes Clusters

Kubolt : Utility For Scanning Public Kubernetes Clusters

Kubolt is simple utility for scanning public unauthinticated kubernetes clusters and run commands inside containers. Sometimes, the kubelet port 10250 is...
What’s the best Internet Service Provider in NYC?

What’s the best Internet Service Provider in NYC?

The Internet is no longer a luxury. It is a part of our daily lives and imagining life without it seems impossible....