Passwordless Authentication Should Become Mainstream by 2023

2 years ago

Since the days of Ancient Rome and Egypt, people have used passwords to authenticate and grant access. Nowadays, passwords are…

Email2PhoneNumber: Obtain Phone Number via Email Address

2 years ago

Introduction  An open-source intelligence (OSINT) tool called Email2PhoneNumber enables you to discover a target's phone number simply by knowing his…

SOC-Multitool

2 years ago

Introduction Introducing SOC Multitool a free and open-source browser extension that accelerates and optimizes research.  Now accessible through the Chrome…

KubeStalk : Discovers Kubernetes Attack Surface From A Black-Box Perspective

2 years ago

KubeStalk is a tool to discover Kubernetes and related infrastructure based attack surface from a black-box perspective. This tool is…

kalipak

2 years ago

Kali Metapackage CLI Use this script if you want access to Kali Metapackage on your current Linux distribution but do…

LazyBox

2 years ago

What is LazyBox? For infosec professionals to quickly set up a good testing environment, a LazyBox has been developed. The…

P-Gen

2 years ago

About Tool: The Python-based P-gen tool generates random passwords in a matter of milliseconds. This tool is compatible with both…

Cracking the User Credentials using the John the Ripper

2 years ago

I am going to demonstrate two ways in which we will crack the user credentials using John the Ripper. So,…

Top 5 popular Web Scanner for Kali Linux

2 years ago

Here are five well-known Web Scanner for Kali Linux, along with their brief descriptions, installation, and usage examples: Kali Linux…

007-TheBond

2 years ago

Information about the Script Finding information about your friends, family, enemies, and the crush who will not talk to you…