[sc name=”ad_1″] Bramble software has been designed for the bramble project. It incorporates many features of pentesting and IT Security...
Search Results For - Access
[sc name=”ad_1″] Docker for pentest is an image with the more used tools to create an pentest environment easily and quickly. Features OS...
[sc name=”ad_1″] Vagrant VirtualBox Environment For Conducting An Internal Network Penetration Test. 1. Capsulecorp Pentest The Capsulecorp Pentest...
[sc name=”ad_1″] An open-source binary debugger for Windows, aimed at malware analysis and reverse engineering of executables you do not have the...
[sc name=”ad_1″] Port forwarding or port mapping is an application of network address translation that redirects a communication request from one...
[sc name=”ad_1″] Shhgit finds secrets and sensitive files across GitHub code and Gists committed in near real time by listening to the GitHub...
[sc name=”ad_1″] Hardened Debian GNU/Linux and CentOS 8 distro auditing. The main test environment is in debian GNU/Linux 9/10 and CentOS 8, and...
[sc name=”ad_1″] Airshare is a Python-based CLI tool and module that lets you transfer data between two machines in a local network, P2P, using...
[sc name=”ad_1″] Server-side template injection is when an attacker is able to use native template syntax to inject a malicious payload into a...
[sc name=”ad_1″] A (Still in Development) monitoring browser extension for pages acting as bad boys. NB: This is the code repository of the...