Saturday, January 25, 2020
Home Tags Vulnerability Scanners

Tag: Vulnerability Scanners

Must Need

Objection : Runtime Mobile Exploration

Objection : Runtime Mobile Exploration

Objection is a runtime mobile exploration toolkit, powered by Frida. It was built with the aim of helping assess mobile applications and...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...
HiddenEye : Modern Phishing Tool With Advanced Functionality

HiddenEye : Modern Phishing Tool With Advanced Functionality

HiddenEye is a modern phishing tool with advanced functionality and it also currently have Android support. Now you will have live information...
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...
Command Injection

Command Injection Payload List

Command injection is an attack in which the goal is execution of arbitrary commands on the host operating system via a vulnerable...
Wordlister : A Simple Wordlist Generator & Mangler Written In Python

Wordlister : A Simple Wordlist Generator & Mangler Written In Python

Wordlister is a simple wordlist generator and mangler written in python. It makes use of python multiprocessing capabilities in order to speed...
SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command

SCShell : Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To...

SCShell is a fileless lateral movement tool that relies on ChangeServiceConfigA to run commands. The beauty of this tool is that it...