I wrote this tool to help me testing XXE vulnerabilities.It generates the XML payloads, and automatically starts a server to …
US, Israel, South Korea, and China look at intrusive surveillance solutions for tracking COVID-19
As the global coronavirus (COVID-19) outbreak is leaving its mark across the world, at least four governments are deploying or …
InstaSave – Python Script To Download Images, Videos & Profile Pictures From Instagram
InstaSave is a python script to download images, videos & profile pictures from Instagram without any API access.Features Download Instagram …
Grab Bonuses from Google for Cloud Platform Vulnerabilities
Can you guess how many users are there who access Google cloud? It’s near about 4 million! Yes, this is …
Firefox to remove support for the FTP protocol
Viewing the content of a FTP server inside Firefox Image: ZDNet Mozilla has announced plans today to remove support for …
Chepy – A Python Lib/Cli Equivalent Of The Awesome CyberChef Tool.
Chepy is a python library with a handy cli that is aimed to mirror some of the capabilities of CyberChef. …
Two Trend Micro zero-days exploited in the wild by hackers
Special feature Cyberwar and the Future of Cybersecurity Today’s security threats have expanded in scope and seriousness. There can now …
Lazydocker – The Lazier Way To Manage Everything Docker
A simple terminal UI for both docker and docker-compose, written in Go with the gocui library. Minor rant incoming: Something’s …
Most ransomware attacks take place during the night or over the weekend
The vast majority of ransomware attacks targeting the enterprise sector occur outside normal working hours, during the night or over …
Token-Reverser – Word List Generator To Crack Security Tokens
Word list generator to crack security tokens.Example use case You are testing reset password function Reset password token was sent …