Wsh : Web Shell Generator And Command Line Interface

4 years ago

wsh (pronounced woosh) is a web shell generator and command line interface. This started off as just an http client…

Jarm : Active Transport Layer Security (TLS) server fingerprinting tool

4 years ago

JARM is an active Transport Layer Security (TLS) server fingerprinting tool. JARM fingerprints can be used to: Quickly verify that…

Learning The Term Search Engine Optimization and Its Sources

4 years ago

SEO refers to the method of creating an internet site that lot of visibility on a probe engine’s results page.…

From Alan Turing to Harvard Computer Science: How Programming Has Changed

4 years ago

Alan Turing’s story about programming is cited by many people because it depicts how the gay community is stigmatized. His…

How your web design can impact your content marketing?

4 years ago

How your web design can impact your content marketing? The web design that a brand uses has a great impact…

UnhookMe : An Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your Red Teams Malware

4 years ago

UnhookMe is a Universal Windows API Resolver And Unhooker Addressing Problem Of Invoking Unmonitored System Calls From Within Of Your…

Sigurlfind3R : A Reconnaissance Tool To Fetch URLs From AlienVault’s OTX

4 years ago

Sigurlfind3R is a passive reconnaissance tool, it fetches known URLs from AlienVault's OTX, Common Crawl, URLScan, Github and the Wayback Machine. Usage sigurlfind3r -h This will…

ADCSPwn : A Tool To Escalate Privileges In An Active Directory Network By Coercing Authenticate From Machine Accounts And Relaying To The Certificate Service

4 years ago

ADCSPwn is a tool to escalate privileges in an active directory network by coercing authenticate from machine accounts (Petitpotam) and…

Php-Jpeg-Injector : Injects Php Payloads Into Jpeg Images

4 years ago

Php-Jpeg-Injector Injects php payloads into jpeg images. Related to this post. Exploiting PHP-GD Image Create From jpeg() Function Proof-of-concept to exploit…

Solitude : A Privacy Analysis Tool That Enables Anyone To Conduct Their Own Privacy Investigations

4 years ago

Solitude is a privacy analysis tool that enables anyone to conduct their own privacy investigations. Whether a curious novice or…