Erlik : Vulnerable Soap Service

2 years ago

Erlik is a vulnerable SOAP web service. It is a lab environment created for people who want to improve themselves…

Masky : Python Library With CLI Allowing To Remotely Dump Domain User Credentials Via An ADCS

2 years ago

Masky is a python library providing an alternative way to remotely dump domain users' credentials thanks to an ADCS. A…

Awesome-Password-Cracking :A Curated List Of Awesome Tools, Research, Papers And Other Projects

2 years ago

Awesome-Password-Cracking is a curated list of awesome tools, research, papers and other projects related to password cracking and password security.…

Autodeauth : A Tool Built To Automatically Deauth Local Networks

2 years ago

Autodeauth is a tool built to automatically deauth local networks Tested on Raspberry Pi OS and Kali Linux Setup $…

Toxssin : An XSS Exploitation Command-Line Interface And Payload Generator

2 years ago

Toxssin is an open-source penetration testing tool that automates the process of exploiting Cross-Site Scripting (XSS) vulnerabilities. It consists of…

Rekono : Execute Full Pentesting Processes Combining Multiple Hacking Tools Automatically

2 years ago

Rekono combines other hacking tools and its results to execute complete pentesting processes against a target in an automated way. The…

ReconPal : Leveraging NLP For Infosec

2 years ago

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to…

Top IP Management Softwares in 2022

2 years ago

Businesses have been getting more and more digitalized. This is great, but rapid digitization has made it difficult for businesses…

Pros & Cons Of Incorporating Cybersecurity Into SEO Strategy

2 years ago

As the internet continues to grow, so does the threat of cybercrime. We all know that the internet is full…

System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware

2 years ago

System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to…