Posta : Cross-document Messaging Security Research Tool

4 years ago

Posta is a tool for researching Cross-document Messaging communication. It allows you to track, explore and exploit postMessage vulnerabilities, and includes features such…

OverRide : Binary Exploitation And Reverse-Engineering

4 years ago

OverRide is a explore disassembly, binary exploitation & reverse-engineering through 10 little challenges. In the folder for each level you…

SlackPirate : Slack Enumeration & Extraction Tool

4 years ago

SlackPirate is a tool developed in Python which uses the native Slack APIs to extract 'interesting' information from a Slack…

Simple Business Plan for Internet Café

4 years ago

A cyber cafe or internet cafe has been a favorite destination for millions of people for over 30 years. The…

IPCDump : Tool For Tracing Interprocess Communication (IPC) On Linux

4 years ago

IPCDump is a tool for tracing inter-process communication (IPC) on Linux. It covers most of the common IPC mechanisms --…

Reasons to Rebrand Your Business

4 years ago

Rebranding your business could be the best or the worst decision a company could make. There have been instances where…

CrossLinked : LinkedIn Enumeration Tool To Extract Valid Employee Names

4 years ago

CrossLinked is a LinkedIn enumeration tool that uses search engine scraping to collect valid employee names from a target organization.…

Vulnerablecode : A Free And Open Vulnerabilities Database

4 years ago

VulnerableCode is a free and open database of FOSS software package vulnerabilities and the tools to create and keep the…

Kubesploit : A Cross-Platform Post-Exploitation HTTP/2 Command

4 years ago

Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent dedicated for containerized environments written in Golang and…

DNSPeep : Spy On The DNS Queries Your Computer Is Making

4 years ago

DNSPeep lets you spy on the DNS queries your computer is making. Here's some example output: $ sudo dnspeepquery name…