Penetration Testing Tools

Penetration Testing Tools

Cansina – Web Content Discovery Tool

Cansina is a Web Content Discovery Application. It is well-known Web functions do not publish all their assets or public hyperlinks, so the one technique to discover these...

dockerscan – Docker Security Analysis and Hacking Tools

What's dockerscan A Docker evaluation instruments Very fast set up > python3.5 -m pip set up -U pip > python3.5 -m pip set up...

Udp2raw-tunnel – A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw...

A UDP Tunnel which tunnels UDP via FakeTCP/UDP/ICMP Traffic by using Raw Socket, helps you Bypass UDP FireWalls (or Unstable UDP Environment). Its Encrypted, Anti-Replay and...

faker.js – Generate Massive Amounts of Fake Data

Generate large quantities of pretend information in Node.js and the browser.Demohttps://cdn.rawgit.com/Marak/faker.js/master/examples/browser/index.htmlHosted API Microservicehttp://faker.hook.io Supports all Faker API Methods Full-Featured Microservice Hosted by hook.io curl http://faker.hook.io?property=identify.findName&locale=de UsageBrowser<script src = "faker.js"...

SJET – JMX Exploitation Toolkit

Java Management Extensions (JMX) is a Java expertise that provides instruments for managing and monitoring functions, system objects, units (comparable to printers) and repair-oriented...

Plecost v1.1.1 – WordPress Finger Printer Tool

What's Plecost? Plecost is a vulnerability fingerprinting and vulnerability finder for Wordpress weblog engine. Why? There are an enormous variety of Wordpress all over the world. Most...

Algo VPN – Set up a personal IPSEC VPN in the cloud

Algo VPN is a set of Ansible scripts that simplify the setup of a personal IPSEC VPN. It makes use of the most secure...

Popular Articles

How to Find Reflected Cross Site Scripting Vulnerability

In our earlier tutorial, now we have realized about Reflected Cross Site Scripting and three fundamental steps to establish and detect Reflected Cross Site...