Heads up, Android users! Researchers have found numerous shady reward apps on Play Store targeting…
Devil’s Pool is a natural pool located at the top of the Victoria Falls, which…
Recon-ng is a reconnaissance framework that can perform open source web based information gathering for…
Commix is a command injection exploitation tool used for testing command injection vulnerabilities in web…
YAWAST is a web application penetration testing toolkit that can perform information gathering and basic…
Fluxion is a wifi security analysis tool that can simulate wifi attacks using the MITM…
Got a huge list of targets that you’d like to enumerate but can’t really visit…
Dnsx is a fast and multi-purpose DNS toolkit that allows you to run multiple probers…
I found this one while doings some research on BadUSBs and thought it would be…
PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can…
What is BinGoo? Welcome to BinGoo, the all-in-one dorking tool written in bash. It uses…
NoSQLMap is an open source python based tool, designed to audit and automate injection attacks…
Yuki Chan is an open source tool that automates some of the information gathering and…
Joomscan is a scanner by OWASP, which aims to automate the task for vulnerability assessments…
Heads up, Android users! Researchers have found numerous shady reward apps on Play Store targeting…
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in…
APIs, APIs Everywhere! Numerous (and by that, I mean all of them) mobile and cloud-native…
Devil’s Pool is a natural pool located at the top of the Victoria Falls, which…
The issue was discovered in mid-March. OrbitScripts LLC fixed the vulnerability shortly after being notified.…