Wednesday, April 8, 2020
Home Tags Xori

Tag: Xori

Must Need

B2R2 : A Collection of Algorithms, Functions And Tools For Binary Analysis

B2R2 : A Collection of Algorithms, Functions And Tools For Binary...

B2R2 is a collection of useful algorithms, functions, and tools for binary analysis written purely in F# (in .NET lingo, it is...
UploadScanner

UploadScanner : HTTP file upload scanner for Burp Proxy

UploadScanner is a Burp Suite Pro extension to do security tests for HTTP file uploads. Testing web applications is a standard task for every...
Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum : Tool For Basic/Advanced Privilege Escalation Techniques

Postenum is a clean, nice and easy tool for basic/advanced privilege escalation vectors/techniques. The tool is intended to be executed locally on...
Vulnado – Intentionally Vulnerable Java Application

Vulnado – Intentionally Vulnerable Java Application

Vulnado is a purposely vulnerable Java application to help lead secure coding workshops. Vulnado application and exercises will take you through...
AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC : Automated Mac Forensic Triage Collector

AutoMacTC is a modular forensic triage collection framework designed to access various forensic artifacts on macOS, parse them, and present them in...
RTTM : Real Time Threat Monitoring Tool

RTTM : Real Time Threat Monitoring Tool

Monitoring possible threats of your company on Internet is an impossible task to be achieved manually. Hence many threats of the...
Pentest Tools Framework : A Database Of Exploits, Scanners & Tools For Penetration Testing

Pentest Tools Framework : A Database Of Exploits, Scanners & Tools...

Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot...