Friday, February 21, 2020
Home Tags Vulnerable

Tag: Vulnerable

Must Need

TAS : A Tiny Framework For Easily Manipulate The TTY & Create Fake Binaries

TAS : A Tiny Framework For Easily Manipulate The TTY &...

TAS is a tiny framework for easily manipulate the tty and create fake binaries. The framework has three main functions, tas_execv, tas_forkpty,...

KDE Applications 19.04 Release

Recently, a new version of KDE Applications was released. It includes 150+ fixes, numerous new updates and fresh options, and several dozens...
CloudFrunt

CloudFrunt Tool For Identifying Misconfigured CloudFront Domains

CloudFrunt is a tool for identifying misconfigured CloudFront domains. CloudFront is a Content Delivery Network (CDN) gave by Amazon Web Services (AWS). CloudFront clients...
Killcast

Killcast : Manipulate Chromecast Devices in your Network

Killcast manipulate chromecast devices in your network. This tool is a Proof of Concept and is for Research Purposes Only, it shows...
TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 : Twitter Shadowban Tests

TwitterShadowBanV2 is a One-page web app, testing Twitter users for conventional and QFD shadowbans. Browser compatibility needs transpiling. Nothing fancy, just the...
XenoScan

XenoScan – Open source memory scanner written in C++

XenoScan is a memory scanner which can be used to scan the memory of processes to locate the specific locations of important values. These...
RSDL : Subdomain Scan With Ping Method

RSDL : Subdomain Scan With Ping Method

RSDL is a tool for subdomain Scan With Ping Method. FlagsValueDescription--hostnameexample.comDomain for scan.--outputRecords the...