AutoRDPwn is a post-exploitation framework created in Powershell, designed primarily to automate the Shadow attack on Microsoft Windows computers. This …
6 Ways to Beat Hackers from Invading Your Phone
Technological advancement has seen smartphones become a crucial part of our lives. There are radical changes that have taken place …
BlackDir-Framework – Web Application Vulnerability Scanner
Web Application Vulnerability Scanner. Spider Directories Find Sub Domain Advanced Dorks Search Scan list of Dorks Scan WebSites [Xss,Sql] Reverse …
Keep Website Away From the Hackers, Learn WordPress Security Issues
As much as you love WordPress, hackers also love getting access to its websites. Yes, there is no doubt that …
HikPwn – A Simple Scanner For Hikvision Devices
HikPwn, a simple scanner for Hikvision devices with basic vulnerability scanning capabilities written in Python 3.8. This project was born …
Grab Bonuses from Google for Cloud Platform Vulnerabilities
Can you guess how many users are there who access Google cloud? It’s near about 4 million! Yes, this is …
Progress-Burp – Burp Suite Extension To Track Vulnerability Assessment Progress
Burp Suite extension to track vulnerability assessment progress. Features Capture items (unique requests) from the Burp Suite tools (Proxy, Repeater, …
SUDO_KILLER – A Tool To Identify And Exploit Sudo Rules’ Misconfigurations And Vulnerabilities Within Sudo
Linux Privilege Escalation through SUDO abuse.If you like the tool and for my personal motivation so as to develop other …
CTFTOOL – Interactive CTF Exploration Tool
An Interactive CTF Exploration ToolThis is ctftool, an interactive command line tool to experiment with CTF, a little-known protocol used …
Re2Pcap – Create PCAP file from raw HTTP request or response in seconds
Re2Pcap is abbreviation for Request2Pcap and Response2Pcap. Community users can quickly create PCAP file using Re2Pcap and test them against …