ApacheTomcatScanner – A Python Script To Scan For Apache Tomcat Server Vulnerabilities
A python script to scan for Apache Tomcat server vulnerabilities. FeaturesMultithreaded workers to search for Apache tomcat servers.Multiple target source...
A python script to scan for Apache Tomcat server vulnerabilities. FeaturesMultithreaded workers to search for Apache tomcat servers.Multiple target source...
Aced is a tool to parse and resolve a single targeted Active Directory principal's DACL. Aced will identify interesting inbound...
A tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $ chmod +x...
A curated list of awesome tools, research, papers and other projects related to password cracking and password security. Read the...
Masky is a Masky also provides options that are commonly provided by such tools (thread number, authentication mode, targets loaded...
Erlik - Informaion Disclosure Code: Code: Command Injection Code: Brute Force Code: Deserialization Code: Download Vulnerable-Soap-Service If you like the...
toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of...
Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way....
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to...
With dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of...
Deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate...
System Informer A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to...
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of...
Hunt & Hackett presents a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution...
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures...
completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks. crAPI is vulnerable by...
ropr is a blazing fast multithreaded ROP Gadget finder What is a ROP Gadget? ROP (Return Oriented Programming) Gadgets are...
hoaxshell is an unconventional Windows reverse shell, currently Find more screenshots here. Installation git clone https://github.com/t3l3machus/hoaxshellcd ./hoaxshellsudo pip3 install -r...
VLAN attacks toolkit DoubleTagging.py - This tool is designed to carry out a VLAN Hopping attack. As a result of...
0x00 Introduction Tool introduction RedGuard is a derivative work of the C2 facility pre-flow control technology. It has a lighter...
A .NET XOR encrypted cobalt strike aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities. Why write...
Get fresh Download NimGetSyscallStub If you like the site, please consider joining the telegram channel or supporting us on Patreon...
In preparation for a VBS AV Evasion Stream/Video I was doing some research for Office Macro code execution methods and...
Faraday was built from within the security community, to make vulnerability management easier and enhance our work. What IDEs are...