Fawkes is a tool to search for targets vulnerable to SQL Injection. Performs the search using Google search engine. Options -q, --query - Dork that will...
Search Results For - Vulnerable
Damn Vulnerable Bank Android Application aims to provide an interface for everyone to get a detailed understanding with internals and security aspects of...
Why? If you try to learn a little bit more about crypto, either because you want to know how the attacks work or just because you want to do safe code, you end...
CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a form or a fetch request. The payload...
Create a vulnerable active directory that’s allowing you to test most of active directory attacks in local lab. Main Features Randomize Attacks Full...
Some HTTP parameter names are more commonly associated with one functionality than the others. For example, the parameter ?url= usually contains URLs as the...
DetExploit is software that detect vulnerable applications and not-installed important OS updates on the system, and notify them to user. As we know, most of...
DCOMrade is a Powershell script that is able to enumerate the possible vulnerable DCOM applications that might allow for lateral movement, code...
Smart devices definitely make our lives easier, faster, and more efficient, but unfortunately, an insecure smart device can also ruin your day, or sometime...
A team at a robot cybersecurity startup has released a free, open-source tool for information security professionals to help them easily...