Heads up, Android users! Before buying a new phone, make sure to verify the device’s …
Aside from the agency’s ambiguous references to how one single target can refer to a …
Trape is a tool written in python that can aid in tracking a client after…
What is msImpersonate? What’s up nerds! Captain AMayorica hooked us up again with another Microsoft…
Bloodhound is an open source application used for analyzing security of active directory domains. The…
BoomER is a Command-line interface python open-source framework fully developed in Python 3.X for post-exploitation…
Altair is a Python tool that can be used to scan for web related vulnerabilities,…
What is Mip22? Mip22 is a modern and advanced cyber security program for use with…
Note that InfoG 1 is now deprecated, use version 2 instead: https://github.com/Tech-Sec/InfoG.git InfoG is a Shellscript…
Today, we talk about SSLyze. SSLyze is a Python tool that can analyze the SSL…
Leviathan is an open source toolkit that can be used for auditing networks and web…
BadKarma is a GUI based network reconnaissance tool that can gather useful network information at…
Final Recon is a useful tool for gathering data about a target from open source…
Cmsmap is a python based CMS scanner for automating the process of vulnerability assessment in…
Heads up, Android users! Before buying a new phone, make sure to verify the device’s …
I found a doozie here ladies and gentlemen, with a little python script called BruteDum. …
Hello Community! We have just completed first vulnhub machine of DC series by DCAU in …
In today’s fast-paced business environment, corporate investigation has become a cornerstone for maintaining integrity, compliance, …
Aside from the agency’s ambiguous references to how one single target can refer to a …
Exploit-db have recently released a local privilege escalation POC as shown in the code example …