ReconPal : Leveraging NLP For Infosec

3 years ago

Recon is one of the most important phases that seem easy but takes a lot of effort and skill to…

Top IP Management Softwares in 2022

3 years ago

Businesses have been getting more and more digitalized. This is great, but rapid digitization has made it difficult for businesses…

Pros & Cons Of Incorporating Cybersecurity Into SEO Strategy

3 years ago

As the internet continues to grow, so does the threat of cybercrime. We all know that the internet is full…

System Informer : A Free, Powerful, Multi-Purpose Tool That Helps You Monitor System Resources, Debug Software And Detect Malware

3 years ago

System Informer, A free, powerful, multi-purpose tool that helps you monitor system resources, debug software and detect malware. Brought to…

dBmonster : Track WiFi Devices With Their Recieved Signal Strength

3 years ago

dBmonster you are able to scan for nearby WiFi devices and track them trough the signal strength (dBm) of their…

Concealed_Code_Execution : Tools And Technical Write-Ups Describing Attacking Techniques

3 years ago

Concealed_Code_Execution is a set of tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows. Here…

RPCMon : RPC Monitor Tool Based On Event Tracing For Windows

3 years ago

RPCMon can help researchers to get a high level view over an RPC communication between processes. It was built like…

crAPI : Completely Ridiculous API

3 years ago

crAPI (completely ridiculous API) will help you to understand the ten most critical API security risks. crAPI is vulnerable by design, but…

dnsReaper : Subdomain Takeover Tool For Attackers, Bug Bounty Hunters And The Blue Team!

3 years ago

DNS Reaper is yet another sub-domain takeover tool, but with an emphasis on accuracy, speed and the number of signatures…

Ropr : A Blazing Fast Multithreaded ROP Gadget Finder. Ropper / Ropgadget Alternative

3 years ago

ROP (Return Oriented Programming) Gadgets are small snippets of a few assembly instructions typically ending in a ret instruction which already exist…