Sign in to follow this
Followers
0
-
Similar Content
-
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. faqMailAccess is tool that developed by Salman Alwan aka JustFaQ to save your time checking your mail access combo, it is simple i know but this is the beta version. You may face some problems, feel free to edit the code. More tools will be added soon.
Features
Main Commands
fast tool
simple ui
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. What is Spray365?
Spray365 is a password spraying tool that identifies valid credentials for Microsoft accounts (Office 365 / Azure AD). How is Spray365 different from the many other password spraying tools that are already available? Spray365 enables passwords to be sprayed from an “execution plan”. While having a pre-generated execution plan that describes the spraying operation well before it occurs has many other benefits that Spray365 leverages, this also allows password sprays to be resumed (-R option) after a network error or other interruption. While it is easiest to generate a Spray365 execution plan using Spray365 directly, other tools that produce a compatible JSON structure make it easy to build unique password spraying workflows.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Malwarebytes Anti-Exploit Premium – will provides the essential exploit protection with proactive technology for browsers and applications. It blocks dangerous exploit-based malware and prevents the damage it can do. Not an antivirus, but compatible with most antivirus, Malwarebytes Anti-Exploit is a small, specialized shield designed to protect you against one of the most dangerous forms of malware attacks. And it’s free. Malwarebytes Anti-Exploit Premium protects you from zero-day exploits targeting browser and application vulnerabilities. Its proprietary technology guards you in that critical period between the release of a new exploit and its security patch. And, unlike antivirus products, Malwarebytes Anti-Exploit Premium proactively prevents the exploit from installing its payload. Before it can do damage.
No other anti-exploit technology (including Microsoft’s Enhanced Mitigation Experience Toolkit) provides three layers of protection. These layers work together to block exploits instantly, in both in the first stage of the attack, preventing shell code execution, and in the second stage, memory calls and sandbox escapes and memory mitigation bypasses.
Malwarebytes Anti-Exploit doesn’t slow down your computer, because this technology doesn’t use a signature database like traditional endpoint security, so it doesn’t require frequent updating. And it only takes up three MBs on your hard drive – the size of one large high-resolution photo.
Malwarebytes Anti-Exploit Premium operates at a different level from and independently of anti-malware and antivirus programs, so you can install it without worry.
Features
• Shields Java
• Shields browsers and browsers add-ons (including Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera)
• Shields PDF readers (including Adobe Reader, Adobe Acrobat, Foxit Reader)
• Shields Microsoft Word, Excel, and Powerpoint
• Shields media players (including Microsoft Windows Media Player, VLC Player, QuickTime Player, Winamp Player)
• Ability to add/manage custom shields
Hidden Content
Give reaction to this post to see the hidden content.
Hidden Content
Give reaction to this post to see the hidden content. -
By itsMe
Hidden Content
Give reaction to this post to see the hidden content. Sub3 Suite is a research-grade suite of tools for Subdomain Enumeration, OSINT Information gathering & Attack Surface Mapping. Supports both manual and automated analysis on variety of target types with many available features & tools. For more information checkout the documentation
Hidden Content
Give reaction to this post to see the hidden content. -
By 0x1
Hidden Content
Give reaction to this post to see the hidden content. Binary Ninja is an interactive disassembler, decompiler, and binary analysis platform for reverse engineers, malware analysts, vulnerability researchers, and software developers that runs on Windows, macOS, Linux.
Disassemble : Disassemble executables and libraries from multiple formats, platforms, and architectures.
Decompile : Decompile code to C or BNIL for any supported architecture - including your own.
Automate : Automate analysis with C++, Python, and Rust APIs from inside or outside the UI.
Analyze : Visualize control flow and navigate through cross-references interactively.
Annotate : Name variables and functions, apply types, create structres, and add comments.
Collaborate : Collaborate effortlessly with synchronized commits using our Enterprise product.
Disassemble Files
Vector 35 provides first-party support for dissassembly from multiple architectures, including x86, x86-64, ARMv7 (with Thumb2), ARMv8 (AArch64), PowerPC, 6502, Z80, and MIPS. Additionally, our community supports many other architectures through our public plugin ecosystem. Loaders are available for all major platforms (PE, Mach-O, ELF) and can be extended or customized using our API.
Decompile Code
Our built-in decompiler works with all of our officially supported architectures at one price and builds on a powerful family of ILs called BNIL. In fact, not just our architectures, but even community architectures can produce amazing decompilation. Our decompiler outputs to both C and BNIL and can be switched on-demand.
Automate Anything
Our extensive API can be used to create and customize loaders, add or augment architectures, customize the UI, or automate any workflow (types, patches, decompilation…anything!). Bindings are available for C++, Python, and Rust.
Create Plugins
Made something cool and want to share? Publish your community plugin and have it featured in our Plugin Manager! These plugins can be installed (or updated) at any time by any customer, right inside the client.
Triage Quickly
Use our API to quickly batch process files and see the results in our triage view. Use the entropy graph to identify areas of interest, like packed or encrypted data. Click on any location to navigate there quickly.
Explore Interactively
We didn’t just build the best automation and API for binary analysis, but our UI design is intentional and clean. None of the distractions, but all of the features you need for the biggest jobs including multiple tabs, synchronized and split views, custom layouts and more.
Annotate Everything
Reverse engineering is the process of exploring the unknown. As your understanding improves, we give you the tools to represent that and improve analysis. Add types, structures, comments, highlights, tags, and more.
Patch Effectively
Make binary patches quickly and effectively with a variety of tools purpose-built for speed. Edit lines of assembly directly, select a preset patch, edit raw bytes with our hex editor view, or even compile C into the executable directly with our own built in compiler SCC.
Switch Platforms
You’ll never be stuck. Binary Ninja not only runs seamlessly on Windows, macOS, and Linux, but every purchases includes all three platforms for one price.
Run Headlessly
No need to only do your analysis inside of Binary Ninja. Instead, bring Binary Ninja into your analysis environment. Use the python repl of your choice, or even statically compile our core analysis library into an existing framework, our analysis can be completely untethered from the UI.
Download :
Hidden Content
Give reaction to this post to see the hidden content.
-