Monday, January 20, 2020
Home Tags WiFi Network

Tag: WiFi Network

Must Need

Trommel

Trommel : Sift Through Embedded Device Files to Identify Potential Vulnerable...

TROMMEL sifts through embedded device files to identify potential vulnerable indicators. It identifies the following indicators related to: Secure Shell...
Bandit : Tool Designed To Find Common Security Issues In Python Code

Bandit : Tool Designed To Find Common Security Issues In Python...

Bandit is a tool designed to find common security issues in Python code. To do this it processes each file, builds an...
Slither

Slither – Static Analyzer for Solidity

Slither is a Solidity static analysis framework written in Python 3. It runs a suite of vulnerability detectors, prints visual information about contract details,...
AutoRDPwn : The Shadow Attack Framework

AutoRDPwn : The Shadow Attack Framework

AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This vulnerability (listed as a feature...
Flashmingo

Flashmingo : Automatic Analysis of SWF Files Based On Some Heuristics

FLASHMINGO is an analysis framework for SWF files. The tool automatically triages suspicious Flash files and guides the further analysis process, freeing...
Bolt

Bolt : Cross-Site Request Forgery Scanner

Bolt is in beta phase of development which means there can be bugs. Any production use of this tool discouraged. Pull requests...
Quarantyne · Modern Web Firewall

Quarantyne · Modern Web Firewall

Quarantyne is a reverse-proxy that protects web applications and APIs from fraudulent behavior, misuse, bots and cyber-attacks in real-time.