Wednesday, April 8, 2020
Home Tags Vulnerability

Tag: vulnerability

Must Need

Blind-Bash

Blind-Bash : Project To Obfuscate Your Bash Code

Blind-bash is an open source project, you can use this project to obfuscate your bash code and obfuscation is the best way to hide...
ReverseAPK

ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications

Now and then, you may have a circumstance to figure out your current APKs for legitimate analysis investigation reasons, for example, making queries on...
Burpsuite Extensions

Burpsuite Extensions – A collection of Burp Suite extensions

A collection of BurpSuite extensions. Burpsuite Extensions gunziper A plugin for the burpsuite (https://portswigger.net/burp/) which enables you to "unpack" requests/responses (e.g. do an base64decode and afterwards...
Airopy : Get Clients And Access Points

Airopy : Get Clients And Access Points

Airopy is a wireless packet capture to get clients and access points. With Alfa cards this script works correctly.
Router Exploit Shovel : Automated Application Generation for Stack Overflow Types on Wireless Routers

Router Exploit Shovel : Automated Application Generation for Stack Overflow Types...

Router Exploit Shovel is an automated application generation for stack overflow types on wireless Routers. It is an automated application generation tool...
Metasploit Framework

Metasploit Framework Part 2 – msfconsole & Exploiting Vulnerable Linux System

Msfconsole provides a handy all-in-one interface to almost every option and setting available in the Framework; it’s like a one-stop shop for all of...
WarBerryPi

WarBerryPi – A Collection Of Scanning Tools For Tactical Exploitation

WarBerryPi was built to be used as a hardware implant during red teaming scenarios where we want to obtain as much information as possible...