mirror of
https://github.com/The-Art-of-Hacking/h4cker.git
synced 2024-12-25 15:19:39 -05:00
Adding new tools
This commit is contained in:
parent
ba07a1f600
commit
58e5651623
@ -2,6 +2,7 @@
|
|||||||
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
The following are a collection of recently-released pen test tools. I update this list every time that there is a new post and when I find a new one around the Internet. The rest of the repository has hundreds of additional cybersecurity and pen test tools.
|
||||||
|
|
||||||
----
|
----
|
||||||
|
- [Attacker-Group-Predictor - Tool To Predict Attacker Groups From The Techniques And Software Used](http://feedproxy.google.com/~r/PentestTools/~3/R3G4YpSDgiU/attacker-group-predictor-tool-to.html)
|
||||||
- [EvilPDF - Embedding Executable Files In PDF Documents](http://feedproxy.google.com/~r/PentestTools/~3/1bx5lbrEBCY/evilpdf-embedding-executable-files-in.html)
|
- [EvilPDF - Embedding Executable Files In PDF Documents](http://feedproxy.google.com/~r/PentestTools/~3/1bx5lbrEBCY/evilpdf-embedding-executable-files-in.html)
|
||||||
- [Needle - Instant Access To You Bug Bounty Submission Dashboard On Various Platforms + Publicly Disclosed Reports + #Bugbountytip](http://feedproxy.google.com/~r/PentestTools/~3/f0edTV__OZg/needle-instant-access-to-you-bug-bounty.html)
|
- [Needle - Instant Access To You Bug Bounty Submission Dashboard On Various Platforms + Publicly Disclosed Reports + #Bugbountytip](http://feedproxy.google.com/~r/PentestTools/~3/f0edTV__OZg/needle-instant-access-to-you-bug-bounty.html)
|
||||||
- [RMIScout - Wordlist And Bruteforce Strategies To Enumerate Java RMI Functions And Exploit RMI Parameter Unmarshalling Vulnerabilities](http://feedproxy.google.com/~r/PentestTools/~3/djPr0ddn3oo/rmiscout-wordlist-and-bruteforce.html)
|
- [RMIScout - Wordlist And Bruteforce Strategies To Enumerate Java RMI Functions And Exploit RMI Parameter Unmarshalling Vulnerabilities](http://feedproxy.google.com/~r/PentestTools/~3/djPr0ddn3oo/rmiscout-wordlist-and-bruteforce.html)
|
||||||
|
Loading…
Reference in New Issue
Block a user