Tuesday, March 26, 2019
Home Tags Vulnerability

Tag: vulnerability

Must Need

Cr3dOv3r

Cr3dOv3r – Know The Dangers Of Credential Reuse Attacks

Cr3dOv3r is know as the dangers of credential reuse attacks. It would be your best friend in credential reuse attacks. You give Cr3dOv3r an...
XVNA

XVNA – Extreme Vulnerable Node Application

XVNA is an extraordinary vulnerable node application coded in Nodejs(Expressjs)/MongoDB that causes security aficionados to learn application security. It's not advised to have this...
DCOMrade

DCOMrade : Powershell script for enumerating vulnerable DCOM Applications

DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
Aircrack-NG

Aircrack-NG : WiFi Security Auditing Tools Suite

Aircrack-ng is a complete suite of tools to assess WiFi network security. It focuses on different areas of WiFi security: Monitoring: Packet capture and export...
Homoglyphs

Homoglyphs – Get Similar Letters, Convert To ASCII, Detect Possible Languages...

Homoglyphs is used to get similar letters, convert to ASCII, detect possible languages and UTF-8 group. Also can say python library for getting it...
WTF

WTF – A Personal Information Dashboard For Your Terminal

WTF is a personal terminal-based dashboard utility, designed for displaying infrequently-needed, but very important, daily data. WTF is only compatible with Go versions 1.9.2...
tcpflow

Tcpflow – To Monitor, Capture & Dump Packets

Tcpflow is a TCP/IP Demultiplexer. Tcpflow is used to record traffic mainly between 2 hosts although it can be used to monitor thousands of...