Monday, June 1, 2020
Home Reconnaissance, Identification & Fingerprinting of Web Application Firewall using WAFW00F wafw00f4

wafw00f4

wafw00f

Verbose Output

wafw00f
wafw00f

Must Need

nmap

NMAP 7.0 Released

NMAP 7.0 What's New ? Nmap has always been the king of scanners for a Security professional. After 18 years from it's first release, the...
TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A Task Manager

TaskManager Button Disabler : Simple Way To Disable/Rename Buttons From A...

TaskManager Button Disabler is a simple way to disable/rename buttons from a task manager. Installation
GhostTunnel

GhostTunnel – Backdoor Transmission Method That Can Be Used In An...

GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment. It can attack the target through the HID device...
RBuster : Yet Another Dirbuster

RBuster : Yet Another Dirbuster

Rbuster is yet another dirbuster with the latest version of v0.2.1. Following are the common command line options;
Agente : Distributed Simple & Robust Release Management & Monitoring System

Agente : Distributed Simple & Robust Release Management & Monitoring System

Agente is a distributed simple and robust release management and monitoring system. Road Map
tyton

Tyton : Kernel-Mode Rootkit Hunter

Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network...
RFI/LFI : Local/Remote File Inclusion

RFI/LFI : Local/Remote File Inclusion

Let us take a look at the RFI/LFI payload list. As with many exploits, remote and local file inclusions are only a...