• Layer Subdomain Excavator 3.1 Necessary for Penetration Test

    instructions: 1. If you want to use a custom dictionary, please name the dictionary file dic and place it in the same directory as the program. The program will automatically load the dictionary. 2. If there is no custom dictionary, the program will automatically use the built-in dictionary. The built-in dictionary has a total of more than 20000 pieces of data, including common sub domain names, as well as 3000+common words and 1-3 letters. 3. If the domain name below level 2 is to be blasted, you can directly fill in the sub domain name to be blasted, and the program will automatically splice the next sub domain. For example, if you fill in hi.baidu.com, the program will explode .hi.ba... read the whole passage
    Author: qxz_xp | Published: May 9, 2014 | Classification: Hacker Tools , Hacker attack and defense | No comment
  • Domestic WEB vulnerability scanner Polar bear scanner

      Polar bear scanner is a simple WEB scanner, but it has very rich functions. In addition to the basic secondary domain name detection and C segment, it also provides search engine crawling sites. Unfortunately, directory scanning cannot skip the fake 404 for the time being, but it supports multi task execution, delays (reducing the speed to avoid being intercepted by security software), and also rarely has the code audit function, which allows administrators to quickly conduct white box testing, hidden trojans in website code, and other detection, which is fast... The vulnerability scanning software only comes with 12 scripts, but it is read the whole passage
    Author: qxz_xp | Published: January 1, 2014 | Classification: Hacker Tools , Hacker attack and defense | 4 comments
  • The latest bug suite_pro_v1.5.18 cracked version

    Burp Suite is a web application integration attack platform, which contains a series of burp tools. There are a lot of interfaces between these tools that can communicate with each other. The purpose of this design is to promote and improve the efficiency of the entire attack. All tools in the platform share the same robust framework, so as to uniformly handle HTTP requests, persistence, authentication, upstream agents, logging, alarms and scalability.   BurpSuite allows attackers to enumerate, analyze, and attack Web applications by combining manual and automated techniques. These different burp workers read the whole passage
    Author: qxz_xp | Published: November 29, 2013 | Classification: Hacker Tools , Hacker attack and defense | No comment