Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   ahm3ds   /   Page 4
objdump2shellcode - A very simple tool that dump shellcode from a provided binary.

objdump2shellcode – A very simple tool that dump shellcode from a provided binary.

July 29, 2017
ahm3ds
Code Scripting, Security Tools

objdump2shellcode is A very simple tool that dumps shellcode from a provided binary. This tools is useful when encoding and creating custom shellcode as it…

Read Article →
webfp-crawler-phantomjs ~ tool to create dataset for testing Website Fingerprint (WF) attacks on Tor.

webfp-crawler-phantomjs ~ tool to create dataset for testing Website Fingerprint (WF) attacks on Tor.

July 4, 2017
ahm3ds
Browser, Networking, Penetration Test

webfp-crawler-phantomjs is A python crawler for crawling Tor and collect network traces using wireshark. Used to create dataset for testing Website Fingerprinting (WF) attacks on…

Read Article →
XSStrike is a python which can fuzz and bruteforce parameters for XSS.

XSStrike is a python which can fuzz and bruteforce parameters for XSS.

June 26, 2017
ahm3ds
Brute Force, Cross Site Scripting(XSS), Fuzzer/Fuzzing

XSStrike is a python which can fuzz and bruteforce parameters for XSS. It can also detect and bypass WAFs. Dependencies: + Python 2.7.x + colorama,…

Read Article →
shellstack - a Simple Backdoor Management System.

shellstack – a Simple Backdoor Management System.

June 20, 2017
ahm3ds
Code Scripting, Penetration Test

ShellStack is a PHP based backdoor management tool. This Tool comes handy for “HACKERS” who wish to keep a track of every website they hack….

Read Article →
angryFuzzer - tools to gather information and discover vulnerabilities.

angryFuzzer – tools to gather information and discover vulnerabilities.

June 3, 2017
ahm3ds
Fuzzer/Fuzzing, Scanner

AngryFuzzer is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb https://github.com/fuzzdb-project/fuzzdb project Discover hidden files…

Read Article →
APacket - Sniffer syn and backscatter packets.

APacket – Sniffer syn and backscatter packets.

May 27, 2017
ahm3ds
Internet Security, Monitoring/System Administrator

APacket is an Sniffer syn and backscatter packets. With Sniffer type; Possible case like pcap, af_packet, pfring, pf_ring (default “pcap”). Dependencies: + Go Proggraming languages…

Read Article →
brutespray : Brute-Forcing from Nmap output - Automatically attempts default creds on found services.

brutespray : Brute-Forcing from Nmap output – Automatically attempts default creds on found services.

May 11, 2017
ahm3ds
Brute Force, Network Mapping/Scanner

BruteSpray takes nmap GNMAP output and automatically brute-forces services with default credentials using Medusa. BruteSpray can even find non-standard ports by using the -sV inside…

Read Article →
Leviathan - wide range mass audit toolkit.

Leviathan – wide range mass audit toolkit.

May 2, 2017
ahm3ds
Brute Force, Exploits, Framework, Networking, Penetration Test

Leviathan is a mass audit toolkit which has wide range service discovery, brute force, SQL injection detection and running custom exploit capabilities. It consists open…

Read Article →
← Previous 1 … 3 4 5 … 20 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools