Wednesday, November 13, 2019
Home Tags Vulnerable Hybrid Mobile Application

Tag: Vulnerable Hybrid Mobile Application

Must Need

nodeCrypto

nodeCrypto : Ransomware written in NodeJs

nodeCrypto is a Linux Ransomware written in NodeJs that encrypt predefined files. This project was created for educational purposes, you are the...
Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 : Windows Recycle Bin Analyser

Rifiuti2 is a for analyzing Windows Recycle Bin INFO2 file. Analysis of Windows Recycle Bin is usually carried out during Windows computer...
RapidRepoPull

RapidRepoPull : Quickly Pull & Install Repos from its List

RapidRepoPull goal is to quickly pull and install repos from its list. This program uses Python to clone/maintain multiple security related repos...
JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON Web Tokens

JWT Tool : A Toolkit For Testing, Tweaking & Cracking JSON...

JWT Tool(jwt_tool.py) is a toolkit for validating, forging and cracking JWTs (JSON Web Tokens). Its functionality includes: Checking the...
Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

Pe-Sieve : Recognizes & Dumps A Variety Of Potentially Malicious Implants

PE-sieve is a light-weight tool that helps to detect malware running on the system, as well as to collect the potentially malicious material...
PyCPU

PyCPU – Central Processing Unit Information Gathering Tool

PyCPU tool you can access detailed information of your processor information. You can also check the security vulnerability based on the current processor information...
Reverse Shell

Reverse Shell Cheat Sheet 2019

If it’s not possible to add a new account / SSH key / .rhosts file and just log in, your next step...