9.5 C
New York
Monday, March 25, 2019
Home Tags Computer Security

Tag: Computer Security

Chomp Scan – A Scripted Pipeline Of Tools To Streamline The...

A scripted pipeline of instruments to simplify the bug bounty/penetration check reconnaissance part, so you possibly can deal with chomping bugs.Scope Chomp Scan is a...

Turbinia – Automation And Scaling Of Digital Forensics Tools

Turbinia is an open-supply framework for deploying, managing, and operating distributed forensic workloads. It is meant to automate operating of widespread forensic processing instruments...

Ghidra – Software Reverse Engineering Framework

Ghidra is a software program reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework features a suite...

Legion – An Easy-To-Use, Super-Extensible And Semi-Automated Network Penetration Testing Tool...

FEATURESAutomatic recon and scanning with NMAP, whataweb, nikto, Vulners, Hydra, SMBenum, dirbuster, sslyzer, webslayer and extra (with virtually 100 auto-scheduled scripts) Easy to make use...

Reload.sh – Reinstall, Restore And Wipe Your System Via SSH, Without...

Reinstall, restore and wipe your system from the extent and within the place of the working GNU/Linux distribution (with out cd-rom, flash and different)....

UserLAnd – The Easiest Way To Run A Linux Distribution or...

The best approach to run a Linux distribution or software on Android. Features:Run full linux distros or particular functions on prime of Android. Install and uninstall...

Cuteit v0.2.1 – IP Obfuscator Made To Make A Malicious Ip...

IP obfuscator made to make a malicious ip a bit cuter A easy python device that can assist you to social engineer, bypass whitelisting firewalls,...
Rpi-Hunter - Automate Discovering And Dropping Payloads On LAN Raspberry Pi's Via SSH

Rpi-Hunter – Automate Discovering And Dropping Payloads On LAN Raspberry Pi’s...

Automate discovering and dropping payloads on LAN Raspberry Pi's by way of ssh.rpi-hunter is helpful when there are a number of Raspberry Pi's in...

CMSeeK v1.1.1 – CMS Detection And Exploitation Suite (Scan WordPress, Joomla,...

What is a CMS? A content material administration system (CMS) manages the creation and modification of digital content material. It usually helps a number of...

Faraday v3.6 – Collaborative Penetration Test and Vulnerability Management Platform

Welcome Service Now A brand new technique to ship vulnerabilities is obtainable! We built-in Faraday with Service Now, providing you with extra choices to work...

HOT NEWS