Friday, August 23, 2019
Home Tags Vulnerable iOS

Tag: Vulnerable iOS

Must Need

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap : Automatic SQL Injection & Database Takeover Tool

SQLMap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over...
Pentest Machine

Pentest Machine – Automates Some Pentest Jobs Via Nmap xml File

Pentest Machine automates some pentesting work via an nmap XML file. As soon as each command finishes it writes its output to the terminal...
LNK-KISSER : AutoIt HackTool, Shortcuts.lnk Payloads Generator

LNK-KISSER : AutoIt HackTool, Shortcuts.lnk Payloads Generator

LNK-KISSER is an autoIt hackTool, shortcuts.lnk payloads generator. Exploiting Powershell to make ShortCut Payloads .There is too much of...
Remote-Desktop-Caching

Remote Desktop Caching : Tool To Recover Old RDP

Remote Desktop Caching tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. It is extremely useful...
Flashmingo

Flashmingo : Automatic Analysis of SWF Files Based On Some Heuristics

FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing...
Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
FindYara

FindYara – IDA Python Plugin To Scan Binary With Yara Rules

FindYara uses IDA python plugin to scan your binary with yara rules. All the yara rule matches will be listed with their offset so...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout