Posts

Showing posts with the label Web Application Security

Janusec Application Gateway - Tool Which Provides Waf, Cc Develop On Defense, Unified Spider Web Direction Portal, Someone Fundamental Protection, Spider Web Routing Together With Scalable Charge Balancing

Image
Janusec Application Gateway, an application safety solutions which provides WAF (Web Application Firewall), unified spider web direction portal, someone fundamental protection, spider web routing as well as scalable charge balancing. With Janusec, y'all tin ship away construct secure as well as scalable applications. Key Features WAF (Web Application Firewall), block SQL Injection, Cross-site Scripting, Sensitive Data Leakage, CC Attacks etc. Group Policy (Cooperation amongst Multiple Check Points) CAPTCHA support Unified Web Administration HTTPS support, No Agent Required. Certificate Protection amongst Private Key Encrypted Storage Scalable Architecture, Load Balance as well as Multiple Nodes Support Screenshots SQL Injection Screenshot Sensitive Data Leakage Screenshot Official Web Site https://www.janusec.com/ Detailed documentation is available at Janusec Application Gateway Documentation . Requirements PostgreSQL 9.3 9.6 or ten (Requi...

Tidos-Framework V1.7 - The Offensive Manual Spider Web Application Penetration Testing Framework

Image
TIDoS Framework is a comprehensive web-app audit framework. let's proceed this simple Highlights :- The top dog highlights of this framework is: TIDoS Framework straight off boasts of a century+ of modules. A consummate versatile framework to comprehend upward everything from Reconnaissance to Vulnerability Analysis. Has five top dog phases, subdivided into 14 sub-phases consisting a total of 104 modules . Reconnaissance Phase has 48 modules of its ain (including active together with passive recon, information disclosure modules). Scanning & Enumeration Phase has got xv modules (including port scans, WAF analysis, etc) Vulnerability Analysis Phase has 36 modules (including most mutual vulnerabilites inward action). Exploits Castle has alone 1 exploit. (purely developmental) And finally, Auxillaries bring got 4 modules. under dev. All iv phases each bring a Auto-Awesome module which automates every module for you. You simply demand the domain, together with ...

Sitebroker - A Cross-Platform Python Based Utility For Data Gathering In Addition To Penetration Testing Automation!

Image
Influenza A virus subtype H5N1 cross-platform python based utility for information gathering as well as penetration automation! Output Sitebroker's Full Output Requirements Python (2.7.*) Python pip Python module requests Python module colorama Python module dnspython Python module lxml Python module bs4 Install modules pip install -r requirements.txt Tested on Windows 7/8/8.1 Kali linux (2017.2) Download SiteBroker You tin download the latest version of SiteBroker past times cloning the GitHub repository. git clone https://github.com/Anon-Exploiter/SiteBroker Updates Changed The Whole Script Into Python (Previously It Was Written In PHP) Exceptions Covered for both User Interrupting && Internel Issues! Removed NetCraft Module every bit We ask to role selinium as well as phantomJS for it (Ultimately making script slow!) Changed the Problem Of Responce Code Of '200' for near sites inward Admin Panel Finder Module && Shel...

H2t - Scans A Website As Well As Suggests Safety Headers To Apply

Image
h2t is a uncomplicated tool to assistance sysadmins to hardening their websites. Until at in i trial h2t checks the website headers too recommends how to larn inwards better. Dependences Python 3 colorama requests Install $ git clone https://github.com/gildasio/h2t $ cd h2t $ pip install -r requirements.txt $ ./h2t.py -h Usage h2t has subcommands: list too scan . $ ./h2t.py -h usage: h2t.py [-h] {list,l,scan,s} ... h2t - HTTP Hardening Tool positional arguments: {list,l,scan,s} sub-command assistance listing (l) demo a listing of available headers inwards h2t catalog (that tin live on used inwards scan subcommand -H option) scan (s) scan url to hardening headers optional arguments: -h, --help demo this assistance message too exit List Subcommand The list subcommand lists all headers cataloged inwards h2t too tin demo informations almost it every bit a description, links for to a greater extent than informati...