Chrome users must ensure that their devices are updated with the latest browser release. Google …
Here I show you how to use Nmap to map the network and discover potential …
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
What is Azurite? This one’s a doozy folks. With the rapid growth of cloud infrastructure…
What is WSL? Some of you may have noticed that I have been running my…
The fsociety hacking tools pack is a penetration testing framework that consists of many of…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
Every reconnaissance phase has a standard checklist that is to be followed. If you’ve ever…
Modlishka is a go based phishing proxy that takes your phishing campaigns to the next…
Protect your Facebook Password Found this one while I was on Safari. Its a pretty…
PhishX is a python tool that can capture user credentials using a spear phishing attack.…
Red Hawk is an open source tool that is used for information gathering and certain…
SecLists is a pentesting tool used by security professionals around the globe, it contains various…
W3af is a GUI based framework that helps in auditing and identifying vulnerabilities in web…
Chrome users must ensure that their devices are updated with the latest browser release. Google …
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
In this digital age, where the advancement of technology has made various tasks easy and …
Here I show you how to use Nmap to map the network and discover potential …
The official website of Ukraine’s election commission was under massive DDoS attack by unknown hackers …