Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. …

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. …
Recon is one of the most important phases that seem easy but takes a lot of effort and skill to …
With dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of …
Deobfuscate Log4Shell payloads with ease. Description Since the release of the Log4Shell vulnerability (CVE-2021-44228), many tools were created to obfuscate …
System Informer A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to …
A GUI tool for scanning RPC communication through Event Tracing for Windows (ETW). The tool was published as part of …
Hunt & Hackett presents a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution …
DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures …
completely ridiculous API (crAPI) will help you to understand the ten most critical API security risks. crAPI is vulnerable by …
ropr is a blazing fast multithreaded ROP Gadget finder What is a ROP Gadget? ROP (Return Oriented Programming) Gadgets are …