QueenoSno : Golang Binary For Data Exfiltration With ICMP Protocol

3 years ago

QueenSono tool only relies on the fact that ICMP protocol isn't monitored. It is quite common. It could also been…

PoW-Shield : Project Dedicated To Fight DDoS And Spam With Proof Of Work, Featuring An Additional WA

3 years ago

PoW-Shield provides DDoS protection on OSI application layer by acting as a proxy that utilizes proof of work between the…

Linux VPN Software – 3 Decent Options

3 years ago

All users connect via a VPN whenever accessing public Wi-Fi connections, especially when sending personal information over an insecure network.…

Haklistgen : Turns Any Junk Text Into A Usable Wordlist For Brute-Forcing

3 years ago

Haklistgen turns any junk text into a usable wordlist for brute-forcing. Installation go install github.com/hakluke/haklistgen@latest Usage Examples Scrape all words…

Reconky : A Great Content Discovery Bash Script For Bug Bounty Hunters Which Automate Lot Of Task And Organized It

3 years ago

Reconky is a script written in bash to automate the task of recon and information gathering. This Bash Script allows…

Wordlistgen : Quickly Generate Context-Specific Wordlists For Content Discovery From Lists Of URLs Or Paths

3 years ago

Wordlistgen is a tool to pass a list of URLs and get back a list of relevant words for your…

AES256_Passwd_Store : Secure Open-Source Password Manager

3 years ago

AES256_Passwd_Store script securely encrypts or decrypts passwords on disk within a custom database file. It also features functionality to retrieve…

DirSearch : A Go Implementation Of Dirsearch

3 years ago

DirSearch software is a Go implementation of the original dirsearch tool written by Mauro Soria. DirSearch is the very first tool I write…

PyHook : An Offensive API Hooking Tool Written In Python Designed To Catch Various Credentials Within The API Call

3 years ago

PyHook is the python implementation of my SharpHook project, It uses various API hooks in order to give us the desired credentials.…