Goby: Attack surface mapping
Hacker Tools
cybarrior

Goby: Attack surface mapping

[ad_1] Goby – Attack surface mapping The new generation of network security technology achieves rapid security emergency through the establishment of a complete asset database

Read More »
MUST READ
Hacker Tools
cybarrior

MUST READ

[ad_1] Recently, we moved to the new Facebook fan page. So, we have never shared or posted anything Security Training Share Facebook fan page. Please

Read More »
Web Auto Enum
Hacker Tools
cybarrior

WAES: Web Auto Enum & Scanner

[ad_1] CPH:SEC WAES at a Glance Doing HTB or other CTFs enumeration against targets with HTTP(S) can become trivial. It can get tiresome to always

Read More »
HashCobra - Hash Cracking Tool
Hacker Tools
cybarrior

HashCobra – Hash Cracking Tool

[ad_1] hashcobra Hash Cracking tool. Usage $ ./hashcobra -H–==[ hashcobra by sepehrdad ]==–usage: hashcobra -o <opr> [options] | [misc]options: -a <alg> – hashing algorithm [default:

Read More »
Functrace - A Function Tracer
Hacker Tools
cybarrior

Functrace – A Function Tracer

[ad_1] functrace is a tool that helps to analyze a binary file with dynamic instrumentation using DynamoRIO (http://dynamorio.org/).These are some implemented features (based on DynamoRIO):

Read More »
Open Redirect Payload List
Hacker Tools
cybarrior

Open Redirect Payload List

[ad_1] Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to

Read More »
aSYNcrone - A SYN Flood DDoS Tool
Hacker Tools
cybarrior

aSYNcrone – A SYN Flood DDoS Tool

[ad_1] aSYNcrone is a C language based, mulltifunction SYN Flood DDoS Weapon. Disable the destination system by sending a SYN packet intensively to the destination.aSYNcrone’s POWER!!! USAGEgit

Read More »
RESim: dynamic system analysis tool
Hacker Tools
cybarrior

RESim: dynamic system analysis tool

[ad_1] RESim RESim is a dynamic system analysis tool that provides detailed insight into processes, programs, and data flow within networked computers. RESim simulates networks

Read More »
Corsy - CORS Misconfiguration Scanner
Hacker Tools
cybarrior

Corsy – CORS Misconfiguration Scanner

[ad_1] Corsy is a lightweight program that scans for all known misconfigurations in CORS implementations. UsageUsing Corsy is pretty simplepython corsy.py -u https://example.comA delay between

Read More »
Dread is Back Online (Again)
Darkweb
cybarrior

Dread is Back Online (Again)

[ad_1] Dread is back online after an extended period of downtime. The forum relaunched with a large set of new features including UI improvements, coatrooms,

Read More »
Sshtunnel - SSH Tunnels To Remote Server
Hacker Tools
cybarrior

Sshtunnel – SSH Tunnels To Remote Server

[ad_1] Inspired by https://github.com/jmagnusson/bgtunnel, which doesn’t work on Windows.See also: https://github.com/paramiko/paramiko/blob/master/demos/forward.py Requirements paramiko Installationsshtunnel is on PyPI, so simply run: pip install sshtunnel or easy_install

Read More »
DNCI - Dot Net Code Injector
Hacker Tools
cybarrior

DNCI – Dot Net Code Injector

[ad_1] DNCI allows the injection of .Net code (.exe or .dll) remotely in unmanaged processes in windows. 1. Project StructureThe project is structured in: DNCI.Injector.Library

Read More »
SQL Injection Payload List
Hacker Tools
cybarrior

SQL Injection Payload List

[ad_1] SQL InjectionIn this section, we’ll explain what SQL injection is, describe some common examples, explain how to find and exploit various kinds of SQL

Read More »
RFI/LFI Payload List
Hacker Tools
cybarrior

RFI/LFI Payload List

[ad_1] As with many exploits, remote and local file inclusions are only a problem at the end of the encoding. Of course it takes a

Read More »
The SamSara Market Homescreen
Darkweb
cybarrior

The Admin of SamSara Market is Gone

[ad_1] SamSara Market, the official yet unofficial successor to Dream Market, has been down for several days without any explanation from the market’s administration. The

Read More »
Rsdl - Subdomain Scan With Ping Method
Hacker Tools
cybarrior

Rsdl – Subdomain Scan With Ping Method

[ad_1] Subdomain Scan With Ping Method. Flags Value Description –hostname example.com Domain for scan. –output Records the output with the domain name. –list /tmp/lists/example.txt Lister

Read More »
HAL - The Hardware Analyzer
Hacker Tools
cybarrior

HAL – The Hardware Analyzer

[ad_1] HAL [/hel/] is a comprehensive reverse engineering and manipulation framework for gate-level netlists focusing on efficiency, extendability and portability. HAL comes with a fully-fledged

Read More »
Mallory - HTTP/HTTPS Proxy Over SSH
Hacker Tools
cybarrior

Mallory – HTTP/HTTPS Proxy Over SSH

[ad_1] HTTP/HTTPS proxy over SSH. Installation Local machine: go get github.com/justmao945/mallory/cmd/mallory Remote server: need our old friend sshd Configueration Config fileDefault path is $HOME/.config/mallory.json, can

Read More »
Gosec - Golang Security Checker
Hacker Tools
cybarrior

Gosec – Golang Security Checker

[ad_1] Inspects source code for security problems by scanning the Go AST. Install CI Installation # binary will be $GOPATH/bin/goseccurl -sfL https://raw.githubusercontent.com/securego/gosec/master/install.sh | sh -s

Read More »
UBoat - HTTP Botnet Project
Hacker Tools
cybarrior

UBoat – HTTP Botnet Project

[ad_1] A POC HTTP Botnet designed to replicate a full weaponised commercial botnet DisclaimerThis project should be used for authorized testing or educational purposes only.The

Read More »
Arjun v1.6 - HTTP Parameter Discovery Suite
Hacker Tools
cybarrior

Arjun v1.6 – HTTP Parameter Discovery Suite

[ad_1] IntroductionWeb applications use parameters (or queries) to accept user input, take the following example into considerationhttp://api.example.com/v1/userinfo?id=751634589This URL seems to load user information for a

Read More »
NCIDE Task Force Identified Another Darkweb Vendor
Hacker Tools