Thursday, April 9, 2020
Home Tags Whatsapp_Automation

Tag: Whatsapp_Automation

Must Need

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra : Password Recovery Tool & Linux Shadow File Cracker

Zydra is a file password recovery tool and Linux shadow file cracker. It uses the dictionary search or Brute force method for...
Bug Bounty

What is Bug Bounty Program?

A bug bounty program, likewise called a vulnerability rewards program (VRP), is a publicly supporting activity that rewards people for finding and revealing programming...
Phishing Frenzy

Phishing Frenzy – Ruby on Rails Phishing Framework

Phishing Frenzy is an Open Source Ruby on Rails application that is leveraged by penetration testers to manage email phishing campaigns. The goal of the...
Pentol

PENTOL – Pentester Toolkit for Fiddler2 2018

PENTOL is a pentester Toolkit is built as a plugin for the Fiddler HTTP debugging proxy. Pentol Features CORS DETECTED Cross-Origin Resource Sharing CRLF DETECTED...
A List Of Services & How To Claim Subdomain With Dangling DNS Records

A List Of Services & How To Claim Subdomain With Dangling...

Subdomain takeover vulnerabilities occur when a subdomain (subdomain.example.com) is pointing to a service (e.g. GitHub pages, Heroku, etc.) that has been removed...
Wreckuests

Wreckuests – Tool To Run DDoS Attacks With HTTP-Flood

Wreckuests is a script, which enables you to run DDoS attacks with HTTP-flood. It's composed in unadulterated Python and utilization proxy servers as bots....
XssPy

XssPy – Web Application XSS Scanner

XssPy is a web application XSS scanner. Xsspy was recently used by an engineer at microsoft to find a bug in Pentagon's Bug Bounty...