SXDork : A Tool That Utilizes The Technique Of Google Dorking To Search For Specific Information On The Internet

2 years ago

SXDork is a powerful tool that utilizes the technique of google dorking to search for specific information on the internet.…

CVE-Vulnerability-Information-Downloader : Downloads Information From NIST (CVSS), First.Org (EPSS), And CISA (Exploited Vulnerabilities) And Combines Them Into One List

2 years ago

CVE-Vulnerability-Information-Downloader downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports from…

Gmailc2 : A Fully Undetectable C2 Server That Communicates Via Google SMTP To Evade Antivirus Protections And Network Traffic Restrictions

2 years ago

Gmailc2 is a Fully Undetectable C2 Server That Communicates Via Google SMTP to evade Antivirus Protections and Network Traffic Restrictions.…

Tracgram : Use Instagram location features to track an account

2 years ago

Trackgram Use Instagram location features to track an account. Usage At this moment the usage of Trackgram is extremly simple:…

Probable_Subdomains : Subdomains Analysis And Generation Tool

2 years ago

Probable_Subdomains is a Subdomains Analysis And Generation Tool Online tool: https://weakpass.com/generate/domains TL;DR During bug bounties, penetrations tests, red teams exercises,…

Where to get knowledge and information about the World of Warcraft for beginners

3 years ago

Despite the fact that World of Warcraft has more than 10 years of history of active development, the project still…

Reverseip_Py : Domain Parser For IPAddress.com Reverse IP Lookup

3 years ago

Reverseip_py is a Domain parser for IPAddress.com Reverse IP Lookup. Written in Python 3. What is Reverse IP? Reverse IP…

ThreatHound : Tool That Help You On Your IR & Threat Hunting And CA

3 years ago

ThreatHound is a tool will help you on your IR & Threat Hunting & CA. just drop your event log…

Faraday : Open Source Vulnerability Management Platform

3 years ago

Security has two difficult tasks: designing smart ways of getting new information, and keeping track of findings to improve remediation…

Upload_Bypass_Carnage : File Upload Restrictions Bypass, By Using Different Bug Bounty Techniques!

3 years ago

Upload_bypass,File upload restrictions bypass, by using different bug bounty techniques! POC video: https://www.youtube.com/watch?v=quFoDysbDto&ab_channel=SagivMichael Installation: pip3 install -r requirements.txt Usage: upload_bypass.py…