Hacking tool details Beginners Anonymously Hiding Tools: Anonmously Surf: https://github.com/Und3rf10w/kali-anonsurf Multitor: https://github.com/trimstray/multitor Information gathering tools: Network Map (nmap): https://github.com/nmap/nmap Dracnmap: https://github.com/Screetsec/Dracnmap Port scanning: Host to IP: https://github.com/geocoder-php/host-ip-provider Xerosploit: https://github.com/LionSec/xerosploit RED HAWK (All In One Scanning):
Cybersecurity
3 min read
Nov 18, 2022
Parameter Tampering a simple attack targeting the application business logic Parameter Tampering is a web-based business logic attack which involves manipulation of parameters exchanged between client and server in order to modify application data( user credentials and permissions, price and quantity of products, etc.). Usually, this information is stored in Cookies, Hidden…
Parameter
5 min read
Mar 5
Attacked From Behind Application Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands in order to cause unintended or unanticipated behavior.