Monday, October 14, 2019
Home Tags Vulnerabilities

Tag: Vulnerabilities

Must Need

mpDNS : Multi-Purpose DNS Server 2019

mpDNS : Multi-Purpose DNS Server 2019

mpDNS aka multi-purpose DNS server is a simple, configurable "clone & run" DNS server with multiple useful features. Should...
Hackertarget

Hackertarget : Tools And Network Intelligence To Help Organizations With Attack...

Hackertarget is a open source tools and network intelligence to help organizations with attack surface discovery and identification of security vulnerabilities. Identification of an...
Unicornscan

Unicornscan – Network Scanning Tool to Find the Open Ports

Unicornscan is an asynchronous network stimulus delivery/response recording tool. Meaning it sends out broken/unorganized/fragmented packets (without a regular pattern unlike other port scanning tools)...
Vboxdie Cracker

Vboxdie Cracker – Virtual Box Disk Image Encryption Password Cracker

Vboxdie Cracker is a virtual box disk image encryption password cracker. User password is stored using a combination of PBKDF2 and AES-XTS, but they...

First Look at Kali Linux 2.0

A rebirth of a penetration testing distribution – Kali Linux 2.0 Codename: Kali Sana On August 11th, Kali Linux Version 2.0 was released. It was...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
SQL Injection Tools

Top 5 SQL Injection Tools for PenTest & Hacking

SQL injection is a code injection technique, used to attack data-driven applications that might destroy your database. Here, malicious codes are...