Friday, September 18, 2020
Home Tags Vulnerability

Tag: vulnerability

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
BaseQuery  : A Way To Organize Public Combo-Lists And Leaks In A Way That You Can Easily Search Through Everything

BaseQuery : A Way To Organize Public Combo-Lists And Leaks...

BaseQuery is a way to organize public combo-lists and leaks in a way that you can easily search through everything.
MXtract

MXtract : Memory Extractor & Analyzer 2019

MXtract is an opensource linux based tool that analyzes and dumps memory. It is developed as an offensive pentration testing...
thc logo

parasite6

Redirect all IPv6 traffic through your attacker machine with parasite6 Parasite6 is the arpspoof in IPv6 networks and also a part of the THC-IPv6 tools...
Lightbulb Framework

Lightbulb Framework : Tools For Auditing WAFS

LightBulb Framework is an open source python framework for auditing web application firewalls and filters. LightBulb Framework Synopsis The framework consists of two main algorithms: GOFA: An active...
Debotnet : Tool For Controlling Windows 10’s Privacy-Related Settings

Debotnet : Tool For Controlling Windows 10’s Privacy-Related Settings

Debotnet is a free and portable tool for controlling Windows 10's many privacy-related settings and keep your personal data private.
KisMac2

KisMac2 – Free Open Source Wireless Stumbling & Security Tool For...

KisMAC2 is a free, open source wireless stumbling and security tool for Mac OS X. This project, is an active project to continue where...