Surprise, surprise, surprise – an internal audit of the US Government cyber security situation has uncovered widespread weaknesses, legacy systems …
BloodHound – Hacking Active Directory Trust Relationships
BloodHound is for hacking active directory trust relationships and it uses graph theory to reveal the hidden and often unintended …
SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester’s companion. It’s a collection of multiple types of lists used during security assessments, collected in …
Multiple ways to track android cell phone
Since the mobile phone technology has made its way to the next level everyone these days love to have android …
DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables …

Samsung Galaxy Buds review
Samsung recently brought there a new true wireless headphones out in the market- Samsung Galaxy Buds. After the immense success of Apple AirPods, …
What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 …
GoBuster – Directory/File & DNS Busting Tool in Go
root: ./gobuster –help –fw – force processing of a domain with wildcard results. –np – hide the progress output. –m …
BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching …
Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique …