Thursday, April 18, 2024
EHA

New Tools

Cyber Detective’s OSINT Tools Collection – A Comprehensive Guide For Digital Investigation

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more. I collect all the links from my tweets...

WormGPT – A Comprehensive Guide To Setting Up On Various Platforms

WormGPT is a versatile tool designed for creating and managing various types of software across multiple operating systems. This guide provides detailed instructions on...

Ediop3Sploit – Comprehensive Installation And Usage Guide

Ediop3Sploit is a controversial tool often associated with black-hat hacking and illicit cyber activities. This guide provides a step-by-step walkthrough on how to install...

Dive Into A new Pentesting Experience with Athena OS

Designed specifically for cybersecurity enthusiasts, Athena OS offers a cutting-edge platform for InfoSec professionals, bug bounty hunters, and students. Explore robust tools and a...

QuickFetch – Quick System Info Tool : Your Comprehensive Guide To Installation And Configuration

QuickFetch is a streamlined tool designed to efficiently retrieve system information with minimal fuss. Whether you're a seasoned developer or a curious tech enthusiast,...

v9.8.0 – Catch ‘Em All : Network Vulnerabilities

We're thrilled to share that with the launch of Nuclei Templates version 9.8.0, we've broadened our scope in network security checks. Our template library...

ICS Security Tools, Tips, And Trade – Mastering Cybersecurity With Comprehensive Guides And Strategies

Essential resource for mastering cybersecurity within the Industrial Control Systems (ICS) environment. This article serves as a community-driven asset, designed to consolidate a variety...

Hacking-Toolkit : The Ultimate Suite For Network Security And Penetration Testing

Developed an integrated suite of network security and penetration testing tools using Python. This toolkit aims to provide cybersecurity professionals and ethical hackers with...

DataSpammer – Comprehensive Guide And Development Journey

Explore the evolution and features of DataSpammer, a versatile software designed to enhance system interaction through automation and shortcuts. This article delves into its...

DNS Tunnel Keylogger – Stealthy Exfiltration And Persistence Techniques

This post-exploitation keylogger will covertly exfiltrate keystrokes to a server. These tools excel at lightweight exfiltration and persistence, properties which will prevent detection. It uses...