Femida Set XSS payloads - Automated blind-xss Search for Burp Suite

Femida – Automated blind-xss Search for Burp Suite

Femida is python plugin for Burp Suite which can automated search blind-xss vulnerability. You will able to fill payloads table with your OOB-XSS vectors.

Read more »
IoT-Implant-Toolkit - what is IoT devices

IoT-Implant-Toolkit – Toolkit for Implant Attack of IoT Devices

IoT-Implant-Toolkit is a framework of useful tools for malware implantation research of IoT devices. Tested implanted Trojans in eight different devices.

Read more »
UBoat - How botnet works xploitlab

UBoat – HTTP Botnet Project

What is a Botnet ? A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform distributed denial-of-service attack (DDoS attack), steal data, send…

Read more »
Invoke-PSImage - Embed a PowerShell Script in The Pixels of a PNG file

Invoke-PSImage – Embed a PowerShell Script in The Pixels of a PNG file and Generates a Oneliner to Execute

Invoke-PSImage takes a PowerShell script and encodes the bytes of the script into the pixels of a PNG image. It generates a oneliner to execute from web.

Read more »
Mobile Security Framework (MobSF) Static Analysis - Android APK xploitlab

Mobile Security Framework (MobSF) – All-in-one Mobile Application Security (Android/iOS/Windows)

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment

Read more »
Pocsuite3 Console Mode - Open-sourced Remote Vulnerability Testing Framework

Pocsuite3 – Open-sourced Remote Vulnerability Testing Framework

Pocsuite3 is an open-sourced remote vulnerability testing and proof-of-concept development framework with many powerful features for the ultimate pentest.

Read more »
what is an smtp server xploitlab

SMTPTester – Tool To Check Common Vulnerabilities in SMTP Servers

SMTPTester is a python3 tool to test SMTP (Simple Mail Transfer Protocol) server for 3 common vulnerabilities: Spoofing, Relay And User Enumeration.

Read more »