Uscrapper 2.0 – Unleashing The Power Of OSINT Web Scraping For Data Extraction

1 year ago

Introducing Uscrapper 2.0, A powerfull OSINT webscrapper that allows users to extract various personal information from a website. It leverages…

GSSAPI-Abuse : Leveraging Kerberos Stacks For Authentication Abuse

1 year ago

gssapi-abuse was released as part of my DEF CON 31 talk. A full write up on the abuse vector can…

DllNotificationInjection – Exploring A Novel Threadless Process Injection Technique

1 year ago

DllNotificationInection is a POC of a new “threadless” process injection technique that works by utilizing the concept of DLL Notification…

httpAlive – URL Analysis Tool For Web Application Penetration Test

1 year ago

Discover 'httpAlive,' a powerful URL analysis tool designed for web application penetration testing. With features like user-agent rotation, multithreading, and…

DDoS Scripts – Supercharging Your Kali Linux With Hacking Tools

1 year ago

Explore the world of DDoS scripts and hacking tools to enhance your Kali Linux experience. In this comprehensive guide, we…

katoolin – Streamline Your Kali Linux Tool Installation With This Comprehensive Guide

1 year ago

katoolin is a powerful tool that simplifies the installation of Kali Linux tools on compatible systems. With the ability to…

PwnDoc – Streamlining Pentest Reporting For Efficient Vulnerability Management

1 year ago

PwnDoc is a pentest reporting application making it simple and easy to write your findings and generate a customizable Docx…

Bypass Fuzzer – Exploring A Powerful Tool For Testing End Point Security

1 year ago

This tool performs various checks via headers, path normalization, verbs, etc. to attempt to bypass ACL's or URL validation. It…

SSH3 – Faster And Rich Secure Shell Using HTTP/3

1 year ago

SSH3 is a complete revisit of the SSH protocol, mapping its semantics on top of the HTTP mechanisms. In a…

EasyEASM : Your Zero-Dollar Solution For Attack Surface Management

1 year ago

Easy EASM is just that... the easiest to set-up tool to give your organization visibility into its external facing assets.…