Saturday, September 21, 2019
Home Tags Vulnerable

Tag: Vulnerable

Must Need

Singularity

Singularity – A DNS Rebinding Attack Framework

Singularity of Origin is a tool to perform DNS rebinding attacks. It includes the necessary components to rebind the IP address of the attack...

WinPwnage – Elevate, UAC Bypass, Privilege Escalation, dll Hijack Techniques

WinPwnage meaning is to study the techniques. Techniques are found online, on different blogs and repos here on GitHub. I do not take credit...
KisMac2

KisMac2 – Free Open Source Wireless Stumbling & Security Tool For...

KisMAC2 is a free, open source wireless stumbling and security tool for Mac OS X. This project, is an active project to continue where...
ReverseAPK

ReverseAPK – Quickly Analyze And Reverse Engineer Android Applications

Now and then, you may have a circumstance to figure out your current APKs for legitimate analysis investigation reasons, for example, making queries on...
Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE : Embedding “UAC-Bypassing” Function Into Your Custom Payload

SneakyEXE is a tool which helps you embedding UAC-Bypassing function into your custom Win32 payloads ( x86_64 architecture specifically )

Penetration Testing Resources For Simulated Attacks

Penetration testing, all the more usually called pentesting, is the act of discovering openings that could be abused in an application, system or framework...

Shopping cart

Subtotal
Shipping and discount codes are added at checkout.
Checkout