Nowadays we live in the era of rapid technological development, where the profession of a programmer becomes more and more …
Liffy – Local File Inclusion Exploitation Tool
LFI Exploitation tool A little python tool to perform Local file inclusion.Liffy v2.0 is the improved version of liffy which …
Cybersecurity alliance launches first open source messaging framework for security tools
A new language framework designed to breach fragmentation gaps between cybersecurity tools has been released to the open source community. …
Ohmybackup – Scan Victim Backup Directories & Backup Files
ohmybackup – Scan Victim’s Backup Directories & Backup Files ohmybackupScans backup folders on target sites. Searches archived files in the …
ObliqueRAT linked to threat group launching attacks against government targets
Researchers have uncovered a new Remote Access Trojan (RAT) that appears to be the handiwork of a threat group specializing …
OWASP D4N155 – Intelligent And Dynamic Wordlist Using OSINT
It’s an information security audit tool that creates intelligent wordlists based on the content of the target page.Help usSee some …
FBI recommends passphrases over password complexity
For more than a decade now, security experts have had discussions about what’s the best way of choosing passwords for …
Google to put a muzzle on Android apps accessing location data in the background
Image: Google Google has announced this week plans to crack down on Android apps that abuse the OS permissions system …
Surfshark VPN – Authentic Review
In today’s digital world, there is a strong demand for stable and efficient network security to protect valuable data. Fortunately, …
SUDO_KILLER – A Tool To Identify And Exploit Sudo Rules’ Misconfigurations And Vulnerabilities Within Sudo
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other …