BadOutlook : Malicious Outlook Reader

5 years ago

BadOutlook is a simple PoC which leverages the Outlook Application Interface (COM Interface) to execute shellcode on a system based…

Gitrecon : OSINT Tool To Get Information From A Github Profile

5 years ago

Gitrecon is a OSINT tool to get information from a Github or Gitlab profile and find user's email addresses leaked…

How to Play Apex Legends: A Beginner’s Guide and Tips

5 years ago

Apex legends is a Battle Royale, first-person-shooter video game that has taken the gaming world by storm. Many people are…

Gain real followers or likes on Instagram using the Followers Gallery app

5 years ago

We love to share posts on Instagram merely because we get likes, comment and shares from our friends and family…

Where To Take Advantage Of Optimized Gaming Performance

5 years ago

Last year, we ran an article about ‘How to Improve Gaming Performance on Your PC’. It shared tips on everything for…

CTF-Party : A Ruby Library To Enhance & Speed Up Script/Exploit

5 years ago

CTF-Party is a library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters,…

Godehashed : Tool That Uses The Dehashed.Com API To Search For Compromised Assets

5 years ago

Godehashed is a golang tool that uses the dehashed.com API to search for compromised assets. Results can then be compiled…

ProxyLogon : PoC Exploit for Microsoft Exchange

5 years ago

ProxyLogon is a tool for PoC exploit for Microsoft exchange. How to use? python proxylogon.py <name or IP of server>…

Netmap.Js : Fast Browser-Based Network Discovery Module

5 years ago

netmap.js provides browser-based host discovery and port scanning capabilities to allow you to map website visitors' networks. It's quite fast,…

Subcert : Finds All The Subdomains From Certificate Transparency Logs

5 years ago

Subcert is a subdomain enumeration tool, that finds all the valid subdomains from certificate transparency logs. Setup Step 1: Install…