Thursday, August 13, 2020
Home Tags Webapp

Tag: Webapp

Must Need

SharpSploit

SharpSploit – A .NET Post-Exploitation Library Written in C#

SharpSploit is a .NET post-exploitation library written in C# that aims to highlight the attack surface of .NET and make the use of offensive...
KRF : A Kernelspace Randomized Faulter

KRF : A Kernelspace Randomized Faulter

KRF is a Kernelspace Randomized Faulter. It currently supports the Linux and FreeBSD kernels. Fault injection is a software...
WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In Kali Tools

WiFi Hacker : Shell Script For Attacking Wireless Connections Using Built-In...

Wifi hacker is a shell script for attacking wireless connections using built-in kali tools. Supports All Securities (WEP, WPS, WPA, WPA2).
Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban : Daemon To Ban Hosts That Cause Multiple Authentication Errors

Fail2Ban scans log files like /var/log/auth.log and bans IP addresses conducting too many failed login attempts. It does this by updating system firewall rules...
Bashark

Bashark – Bash Pentesters & Security Researchers Post Exploitation Toolkit

Bashark aids pentesters and security researchers during the post-exploitation phase of security audits. To launch it on compromised host, simply source the bashark.sh script...
XssPy

XssPy – Web Application XSS Scanner

XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty...
Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe : Undetectable & Xor Encrypting With Custom KEY

Xeexe is a undetectable Reverse shell & Xor encrypting with custom KEY(FUD Metasploit Rat) bypass Top Antivirus like BitDefender, Malwarebytes, Avast, ESET-NOD32,...