Thursday, April 2, 2020
Home Tags Web application

Tag: web application

Must Need

Steal NTLM Hashes

Bad-PDF To Steal NTLM Hashes From Windows Machines

Bad-PDF make pernicious PDF to steal NTLM Hashes from windows machines, it use defenselessness revealed by checkpoint group to make the malicious PDF record....
PwnedOrNot

PwnedOrNot : OSINT Tool to Find Passwords for Compromised Email Addresses

PwnedOrNot is a OSINT tool to find passwords for compromised email addresses. pwnedOrNot uses haveibeenpwned v2 api to test email accounts and...
Hooker

Hooker : Automated Dynamic Analysis of Android Applications

Hooker is an opensource venture for dynamic analyses of Android applications. This venture gives different devices and applications that can be use to consequently...
XORpass : Encoder To Bypass WAF Filters Using XOR Operations

XORpass : Encoder To Bypass WAF Filters Using XOR Operations

XORpass is an encoder to bypass WAF filters using XOR operations. Installation & Usage
CRS

CRS – OWASP ModSecurity Core Rule Set

The OWASP ModSecurity Core Rule Set or CRS is a set of generic attack detection rules for use with ModSecurity or compatible web application...

Tips for Recovering the data easily

Recovering data has been mysterious job for a long time once users lost data and then have to ask some experts to do...
yersinia

Yersinia for Layer 2 – Vulnerability Analysis & DHCP Starvation Attack

Yersinia is a network tool designed to take advantage of some weakness in different network protocols. It pretends to be a solid framework for...