Monday, October 26, 2020

Trending Tools

NashaVM : A Virtual Machine For .NET Files & Its Runtime Was Made In C++/CLI

NashaVM : A Virtual Machine For .NET Files & Its Runtime Was Made In...

Nasha is a Virtual Machine for .NET files and its runtime was made in C++/CLI Installation
SwiftBelt : A macOS Enumeration Tool Inspired By Harmjoy’S Windows

SwiftBelt : A macOS Enumeration Tool Inspired By Harmjoy’S Windows

SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities and instead...
C41N : An Automated Rogue Access Point Setup Tool

C41N : An Automated Rogue Access Point Setup Tool

c41n is an automated Rogue Access Point setup tool. c41n provides automated setup of several types of Rogue Access Points, and Evil...
vPrioritizer : Tool To Understand The Contextualized Risk (vPRisk)

vPrioritizer : Tool To Understand The Contextualized Risk (vPRisk)

As indicated by sources like vulndb & cve, on a daily basis, approximately 50 new vulnerabilities become known to industry and it’s...
CSRFER : Tool To Generate CSRF Payloads Based On Vulnerable Requests

CSRFER : Tool To Generate CSRF Payloads Based On Vulnerable Requests

CSRFER is a tool to generate csrf payloads, based on vulnerable requests. It parses supplied requests to generate either a form or...
How to fix asulfur smell in your Hot Water Heater?

How to fix asulfur smell in your Hot Water Heater?

Have you noticed that the hot water in your home smells like sulfur? Other people may describe this odor as smelling like...
GHunt : Tool To Extract Information From Google Account

GHunt : Tool To Extract Information From Google Account

GHunt is an OSINT tool to extract information from any Google Account using an email. It can currently extract:
How much do Background Checks know About You?

How much do Background Checks know About You?

With an increasing demand for background checks to be completed before signing most major contracts (like employment, renting a property, or even...
Lockphish : The First Tool For Phishing Attacks

Lockphish : The First Tool For Phishing Attacks

Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone...
Your Guide to Popular Mac Issues and Fixes

Your Guide to Popular Mac Issues and Fixes

Macbooks are durable and reliable. However, if you have had the same Mac for many years, you may start to notice that...
5,000FollowersFollow

Most Used

Important tools

Kali Linux Tools

The blog covers kali linux tools right from the developers including detailed explanation on how to use the tools to perform a penetration testing. We covers various tools that to be used with various operating systems.