Impost3r - tool that aim to steal many kinds of linux passwords
Attackers can use Impost3r to make a trap to steal the legal user's passwords XD This tool is limited to security research and teaching, and the user bears all legal and related responsibilities caused...
View ArticleTangalanga: the Zoom conference scanner hacking tool
Tangalanga is a Zoom Conference scanner. This scanner will check for a random meeting id and return information if available. Usage Those are all the possible flags: tangalanga \ -token=user-token \ #...
View ArticleAre PC Optimization Tools Safe?
Normally, I don’t pay much attention to what’s going on with my computer. After all, I have no reason to since I've never run into major PC issues. I mostly use my laptop for streaming services like...
View ArticleFsociety Hacking Tools Pack - A Penetration Testing Framework
Fsociety is a penetration testing system comprises of all penetration testing devices that a programmer needs. It incorporates every one of the devices associated with the Mr. Robot Series. The tool...
View ArticleRecox - Master script for web reconnaissance
Recox v1.0 is the script that aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other than OWASP top ten. The script presents...
View ArticleCybersecurity Exposure Index: The Most Exposed Countries
New Cybersecurity Exposure Index (CEI) by password security resource, PasswordManagers.co, reveals which countries are the most and least exposed to cybercrime From end-point and cloud cyberattacks...
View ArticleBuffer Overflow Shellcode [FREE COURSE CONTENT]
In this video from our Advanced Linux Exploit Development online course instructed by our author and reviewer, Ali Abdollahi, we'll see how to exploit buffer overflow with shellcode. It's a simple...
View ArticleBlackDir-Framework: Web Application Vulnerability Scanner
[1] Spider Directories [2] Find Sub Domain [3] Advanced Dorks Search [4] Scan list of Dorks [5] Scan WebSites [Xss,Sql,Html Inj] [6] Reverse Ip Lookup [7] Port Scan Installation: git clone...
View ArticleBandit is a tool designed to find common security issues in Python code
Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit...
View ArticleMARA is a Mobile Application Reverse engineering and Analysis Framework.
MARA is a Mobile Application Reverse engineering and Analysis Framework. It is a tool that puts together commonly used mobile application reverse engineering and analysis tools, to assist in testing...
View ArticleSecuring Your SAP Implementation by Gilad David Maayan
SAP systems are used by many organizations to store and process significant amounts of confidential or sensitive data. This data is incredibly valuable to the organizations themselves, their customers,...
View ArticleO.G. AUTO-RECON: Enumerate a target Based off of Nmap Results
The purpose of O.G. Auto-Recon is to automate the initial information-gathering phase and then enumerate based on those results as much as possible. This tool is intended for CTF's and can be fairly...
View ArticleOsmedeus - Fully automated offensive security framework for reconnaissance...
Osmedeus allows you automated run the collection of awesome tools to reconnaissance and vulnerability scanning against the target. Installation git clone https://github.com/j3ssie/Osmedeus cd Osmedeus...
View ArticleStriker - Recon & Vulnerability Scanning Suite
Striker 2.0 is still in the prototype phase, which means it's not intended to be used by regular users. It has been made public for contributions to make the development faster. Usage: python3...
View ArticleRaccoon - Offensive Security Tool for Reconnaissance and Information Gathering
Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data,...
View ArticleTBomb An open-source SMS/call bomber for Linux And Termux.
Due misusing of TBomb, several API's died. Don't be afraid if you don't see all send messages. The script requires a working network connection to work. No balance will be deducted for using this...
View ArticleBaseCrack - Best Decoder Tool For Base Encoding Schemes
BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from the argument, multi-encoded...
View ArticleBSF - Botnet Simulation Framework
BSF provides a discrete simulation environment to implement and extend peer-to-peer botnets, tweak their settings, and allow defenders to evaluate monitoring and countermeasures. Synopsis In the arms...
View ArticlePreventing XXE Attacks [FREE COURSE CONTENT]
In this video from our Web Apps Attack and Defense: Secure Coding our instructor Munir shows methods for preventing XXE attacks on web applications. This video assumes you know what XXE attacks are...
View ArticleXeexe - Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat)
Xeexe is a FUD exploiting tool which compiles a malware with famous payload, and then the compiled malware can be executed on Windows Xeexe Provides An Easy way to create Backdoors and Payload which...
View Article