Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Ken-Pachi   /   Page 5
The Penetration Testers Framework (PTF) v1.14 codename: Tool Time.

The Penetration Testers Framework (PTF) v1.14 codename: Tool Time.

June 17, 2017
Ken-Pachi
Framework, Penetration Test

Roadmap changelog The PenTesters Framework version 1.14 from 1.10: * added new flag INCLUDE_ONLY_THESE_MODULES (thanks cobbr) * remove prompt for install update all for automatic…

Read Article →
vais - SWF Vulnerability & Information Scanner.

vais – SWF Vulnerability & Information Scanner.

June 7, 2017
Ken-Pachi
Code Scripting, Scanner

vais is a ruby script for Vulnerability Analysis In SWF file and Find dangerous settings in the SWF and possible vulnerabilities in ActionScript. Dependencies: +…

Read Article →
pgpdump is a PGP packet visualizer.

pgpdump is a PGP packet visualizer.

May 31, 2017
Ken-Pachi
Cryptography, Encryption, Networking, Security Tools

pgpdump is a PGP packet visualizer which displays the packet format of OpenPGP (RFC 4880) and PGP version 2 (RFC 1991). Availability: – The first…

Read Article →
MEM64 - Memory Only Payload With HTA Attack Vector.

MEM64 – Memory Only Payload With HTA Attack Vector.

May 22, 2017
Ken-Pachi
Code Scripting, Penetration Test

LEGAL DISCLAIMER: THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,…

Read Article →
Hawkeye is A project security/vulnerability/risk scanning tool.

Hawkeye is A project security/vulnerability/risk scanning tool.

April 29, 2017
Ken-Pachi
Scanner, Security Tools

Hawkeye is a project security, vulnerability and general risk highlighting tool. It has a few goals: + Designed to be entirely extensible by just adding…

Read Article →
GhostInTheNet - Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM.

GhostInTheNet – Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM.

April 22, 2017
Ken-Pachi
Networking, Security Tools

GhostInTheNet a bash script for Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM Properties: – Network Invisibility –…

Read Article →
blindy - Simple script to automate bruteforcing blind sql injection vulnerabilities.

blindy – Simple script to automate bruteforcing blind sql injection vulnerabilities.

April 10, 2017
Ken-Pachi
Brute Force, Sql Injection

blindy is a script will run through queries listed in sets in provided file (default-queries.json as default) and try to bruteforce places with {} placeholder….

Read Article →
Punter - a passive domain hunter.

Punter – a passive domain hunter.

April 8, 2017
Ken-Pachi
Code Scripting, Penetration Test

Punter is A quick little python script I wrote to take DNS Dumpster and WHOIS data and run a reverse whois on results. A HTML…

Read Article →
← Previous 1 … 4 5 6 … 19 Next →

Copyright © 2023

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools