Invoke-PSObfuscation : An In-Depth Approach To Obfuscating the PowerShell Payload On Windows Or Kali Linux

2 years ago

Invoke-PSObfuscation is an in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali…

Cybersecurity 101: Understanding the Basics of Online Security

2 years ago

With the rise of technology connecting the world, the importance of online security has never been more imperative. Cybersecurity refers…

Blackbird – OSINT Tool to Find Accounts Using Username

2 years ago

Blackbird is a user name enumeration tool developed by Cyber Hunter Lab. This is one of the OSINT tools to…

GPT_Vuln-analyzer : Uses ChatGPT API To Create Vulnerability Reports Based On Nmap Scan

2 years ago

GPT_Vuln-analyzer uses ChatGPT API and Python-Nmap module to use the GPT3 model to create vulnerability reports based on Nmap scan…

Ator : Authentication Token Obtain and Replace Extender

2 years ago

The plugin is created to help automated scanning using Burp in the following scenarios: Access/Refresh token Token replacement in XML,JSON…

Fingerprintx – Tool to Fingerprint Services Running on Ports

2 years ago

Fingerprintx is a port scanner tool that helps to find the open ports and to fingerprintx the services running in…

NimPlant : A Light-Weight First-Stage C2 Implant Written In Nim

2 years ago

NimPlant is a light first-stage C2 implant written in Nim and Python Feature Overview Lightweight and configurable implant written in…

Tool-X – Single Click Installer For 70 Hacking Tools on Android

2 years ago

Tool-x is a recently developed installation tool for Android that functions in conjunction with the Termux emulator. The installer can…

Subfinder – A New Tool to Discover Subdomains for Websites

2 years ago

Today, we will present a new tool for gathering information to identify subdomains linked to a particular domain. The subdomains…

Hunxploit04 – A new OSINT Tools for Information Gathering

2 years ago

Gathering information is essential in ethical hacking, as it entails accumulating extensive data regarding the targeted system or organization. The…