Tishna : Automated Web Application Hacker 2020

Tishna is an complete Automated pentest framework for Servers, Application Layer to Web Security. This software have 62 Options with full automation and can be use for web security swiss knife.

  • Tishna is Web Server Security Penetration Software for Ultimate Security Analaysis
  • Kali, Parrot OS, Black Arch, Termux, Android Led TV

Also Read – AVCLASS++ : Yet Another Massive Malware Labeling Tool

Brief Introduction

  • Tishna is useful in Banks, Private Organisations and Ethical hacker personnel for legal auditing.
  • It serves as a defense method to find as much as information possible for gaining unauthorised access and intrusion.
  • With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.
  • Tishna software can audit, servers and web behaviour.
  • Tishna can perform Scanning & Enumeration as much as possible of target.
  • It’s first step to stop cyber criminals by securing your Servers and Web Application Security.
  • Tishna is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.

Kali Installation

git clone https://github.com/haroonawanofficial/Tishna.git
cd Tishna
sudo chmod u+x *.sh
./Kali_Installer.sh

Tishna will integrate as system software. Dependencies will be handled automatically. Third party software(s)/dependencies/modules will be handled automatically.

R K

Recent Posts

How to Install Docker on Ubuntu (Step-by-Step Guide)

Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…

1 day ago

Uninstall Docker on Ubuntu

Docker is one of the most widely used containerization platforms. But there may come a…

1 day ago

Admin Panel Dorks : A Complete List of Google Dorks

Introduction Google Dorking is a technique where advanced search operators are used to uncover information…

2 days ago

Log Analysis Fundamentals

Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…

3 days ago

Networking Devices 101: Understanding Routers, Switches, Hubs, and More

What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…

4 days ago

Sock Puppets in OSINT: How to Build and Use Research Accounts

Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…

4 days ago