Wifi-Hacker – Shell Script For Attacking Wireless Connections Using Built-In Kali Tools
Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)Download Wifi-Hacker Original Source
Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2)Download Wifi-Hacker Original Source
Using the right managed detection and response (MDR) solution can help defend against threats and is a valuable tool in...
Get teamviewer's ID and password from a remote computer in the LANThis program gets teamviewer's ID and password from a...
Rapid7 is excited to announce the launch of Rapid7 Discuss, a forum and community intended to serve as a home...
Miami, February 19, 2020 - Faraday is opening 2020 by strengthening their releases using the featured cybersecurity worldwide events calendar,...
This software is a subdomain enumeration tool.Purposednssearch takes an input domain ( -domain parameter ) and a wordlist ( -wordlist...
LFI Exploitation toolA little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which was...
This blog was coauthored by Bria Grangard and Justin Buchanan.Every business is becoming a software business, and web applications are...
DLLPasswordFilterImplant is a custom password filter DLL that allows the capture of a user's credentials. Each password change event on...
ohmybackup - Scan Victim's Backup Directories & Backup FilesohmybackupScans backup folders on target sites. Searches archived files in the folders...
This project inspects Java libraries and classpaths for gadget chains. Gadgets chains are used to construct exploits for deserialization vulnerabilities....
It's an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some...
Simple way to disable/rename buttons from a task manager.Installationgit clone https://github.com/Mrakovic-ORG/TaskManager-Button-Disablercd TaskManager-Button-DisablerTaskManager Button Disablerdotnet buildFeaturesRename kill proccess buttonDisable kill proccess...
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other...
We are thrilled to announce that global research and consulting firm Frost & Sullivan has named Rapid7 as the Global...
AdamaSearches For Threat Hunting and Security AnalyticsA collection of known log and / or event data searches for threat hunting...
Intelligence Tool but without API keyWhat is Metabigor?Metabigor is Intelligence tool, its goal is to do OSINT tasks and more...
Rapid7 is thrilled to be recognized as a Leader in the 2020 Gartner Magic Quadrant for Security Information and Event...
When it comes to the data displayed in your security products, we understand that no two people want—or even need—the...
RApid Big IP DecoderWhat it isA CLI tool and library allowing to simply decode all kind of BigIP cookies.FeaturesSupport all...
Cross-site scripting labs for web application security enthusiastsList of Chall :~ Chall 1 | URL~ Chall 2 | Form~ Chall...
The RSA Conference 2020 is swiftly approaching, and we’re getting excited about the events we’ll be attending as we join...
Parse & filter the latest CVEs from https://cve.mitre.org. DocsUsagehttp://localhost:4000/cve?target=KEYWORDThe year parameter is optional.http://localhost:4000/cve?target=KEYWORD&year=YEARExampleshttp://localhost:4000/cve?target=ruby%20on%20railshttp://localhost:4000/cve?target=ruby%20on%20rails&year=2020If you want to parse the latest year,...
NekoBotV1 | Auto Exploiter With 500+ Exploit 2000+ ShellFeatures : Wordpress :1- Cherry-Plugin2- download-manager Plugin3- wysija-newsletters4- Slider Revolution 5- gravity-forms6-...