Thursday, November 26, 2020
Home Tags Vulnerability

Tag: vulnerability

Must Need

Shellerator : CLI Tool For The Generation Of Bind & Reverse Shell

Shellerator : CLI Tool For The Generation Of Bind & Reverse...

Shellerator is a simple command-line tool aimed to help pentesters quickly generate one-liner reverse/bind shells in multiple languages (Bash, Powershell, Java, Python...)....
Buster : Find Emails Of A Person And Return Information Associated With Them

Buster : Find Emails Of A Person And Return Information Associated...

Buster is a tool to find emails of a person and return info associated with them. It is a simple OSINT tool...
Crypton

Crypton – Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all...
MCExtractor

MCExtractor – Intel, AMD, VIA & Freescale Microcode Extraction Tool

MCExtractor is a tool which parses Intel, AMD, VIA and Freescale processor microcode binaries. It can be used by end-users who are looking for...
Chaos

CHAOS : PoC that Allow Generate Payloads & Control Remote OS

CHAOS is a PoC that allow generate payloads and control remote operating systems. Features
CyberRange : The Open-Source AWS Cyber Range

CyberRange : The Open-Source AWS Cyber Range

This CyberRange project represents the first open-source Cyber Range blueprint in the world. This project provides a bootstrap framework for a complete...
0d1n

0d1n : Web Security Tool to Make Fuzzing at HTTP/S

0d1n is a tool for automating customized attacks against web applications. Let us have a look on the features the Web Security...