How to Market Your IT Security Business or Consultancy

4 years ago

Managing an IT security business or consultancy is difficult enough on its own. Add in the necessity of marketing your…

Recox : Master Script For Web Reconnaissance

4 years ago

The script aims to help in classifying vulnerabilities in web applications. The methodology RecoX is arising can spot weaknesses other…

Jshole : A JavaScript Components Vulnerability Scanner

4 years ago

Jshole is a simple JavaScript components vulnrability scanner, based on RetireJS. Why use JShole instead of RetireJS? By default, RetireJS…

GitMonitor : A Github Scanning System To Look For Leaked Sensitive Information Based On Rules

4 years ago

GitMonitor is a Github scanning system to look for leaked sensitive information based on rules. I know that there are…

Ligolo : Reverse Tunneling Made Easy For Pentesters

4 years ago

Ligolo is a simple and lightweight tool for establishing SOCKS5 or TCP tunnels from a reverse connection in complete safety…

Eviloffice : Inject Macro & DDE Code Into Excel & Word Documents

4 years ago

Eviloffice is a tool used to inject macro and DDE code into Excel and Word documents (reverse shell). Features Inject…

Inshackle : Instagram Hacks

4 years ago

Inshackle is a tool used to hack Instagram and track unfollowers, increase your followers, download Stories, etc. Features Unfollow TrackerIncrease…

GhostShell : Malware Indetectable With AV Bypass Techniques & Anti-Disassembly

4 years ago

GhostShell is a Malware indetectable, with AV bypass techniques, anti-disassembly, etc. In this malware, are used some techniques to try…

Forerunner : Fast & Extensible Network Scanning Library

4 years ago

The Forerunner library is a fast, lightweight, and extensible networking library created to aid in the development of robust network…

Enumy : Linux Post Exploitation Privilege Escalation Enumeration

4 years ago

Enumy is an ultra fast portable executable that you drop on target Linux machine during a pentest or CTF in…