Friday, August 23, 2019
Home Tags Vulnerabilities

Tag: Vulnerabilities

Must Need

Leviathan : Wide Range Mass Audit Toolkit

Leviathan : Wide Range Mass Audit Toolkit

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities....
Hindsight

Hindsight – Tool For Analyzing Web Artifacts Chrome Browser & Chromium-Based...

Hindsight is a free tool for analyzing web artifacts. It started with the browsing history of the Google Chrome web browser and has expanded...
OverThruster

OverThruster – HID Attack Payload Generator For Arduinos

OverThruster is a tool to generate sketches for Arduinos when used as an HID Attack. It was designed around devices with the ATMEGA32U4 chip,...
CANalyzat0r

Security Analysis Toolkit For Car Protocols – CANalyzat0r

CANalyzat0r is a Python software project built from scratch with new ideas for analysis mechanisms. Why CANalyzat0r?
DNS-Shell

DNS-Shell : An Interactive Shell Over DNS Channel

DNS-Shell is an interactive Shell over DNS channel. The server is Python based and can run on any operating system that...
WinPirate

WinPirate : Automated Sticky Keys Hack From A Bootable USB

Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords. Here's the plan. We create a way to automate doing...
Stardox

Stardox – Github Stargazers Information Gathering Tool

Stardox is an advanced github stargazers information gathering tool. It scraps Github for information and display them in list tree view.It can...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout