Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   anon80   /   Page 4
Commix v0.7b - Automatic All-in-One OS Command Injection and Exploitation Tool.

Commix v0.7b – Automatic All-in-One OS Command Injection and Exploitation Tool.

April 5, 2016
anon80
Exploits, Framework, Networking, Penetration Test

Changelog Version 0.7b: * Added: The ability to store valid (Digest) credentials into session files for current target. * Added: Dictionary-based cracker for “Digest” HTTP…

Read Article →
payday - Payload generator that uses Metasploit and Veil.

payday – Payload generator that uses Metasploit and Veil.

March 19, 2016
anon80
Code Scripting, Exploits

Payload generator that uses Metasploit and Veil. Takes IP address input and then builds payloads automatically. Calls Veil framework with supplied IP address and creates…

Read Article →
FruityWifi v-2.4 - is an open source tool to audit wireless networks.

FruityWifi v-2.4 – is an open source tool to audit wireless networks.

February 21, 2016
anon80
Networking, Penetration Test, Phishing, Wireless/wifi

changelog v2.4: + Utils have been added (replaces “ifconfig -a”) + Kali Linux Rolling compatibility issue has been fixed FruityWifi is a wireless network auditing…

Read Article →
SQLcutie 1.8a - sqli dork scanner.

SQLcutie 1.8a – sqli dork scanner.

February 5, 2016
anon80
Code Scripting, Penetration Test, Sql Injection

SQLcutie is a compact search engine dorker which able to search over 10 different types of error. To able to use sqlcutie you need Perl’s…

Read Article →
striptls - poc implementation of STARTTLS stripping attacks.

striptls – poc implementation of STARTTLS stripping attacks.

February 2, 2016
anon80
Encryption, Penetration Test

striptls – poc implementation of STARTTLS stripping attacks. SMTP + SMTP.StripFromCapabilities – server response capability patch + SMTP.StripWithInvalidResponseCode – client STARTTLS stripping, invalid response code…

Read Article →
shellsploit-framework v1-beta : New Generation Exploit Development Kit.

shellsploit-framework v1-beta : New Generation Exploit Development Kit.

January 27, 2016
anon80
Exploits, Framework

Shellsploit let’s you generate customized shellcodes, backdoors, injectors for various operating system. And let’s you obfuscation every byte via encoders. Requirement: + capstone + readline…

Read Article →
V3n0mScanner v4.0.2c - A tool to automate mass SQLi d0rk scanner.

V3n0mScanner v4.0.2c – A tool to automate mass SQLi d0rk scanner.

January 25, 2016
anon80
Penetration Test, Scanner, Sql Injection

Changelog V.4.0.2c, 25/1/2016: Pulls far more results per page, sadly more results negates the slight speed improvement from “Keep-Alive”… Still working on improving overall Search-Engine…

Read Article →
Fire - Custom LKM firewall passes packets to userland python script.

Fire – Custom LKM firewall passes packets to userland python script.

January 4, 2016
anon80
Firewall, Networking, Security Tools

fire is custom firewall resides in kernel space and userspace Contains 2 components: + custom.ko — LKM (linux kernel module) + fire.py — Python script…

Read Article →
← Previous 1 … 3 4 5 … 10 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools